The kernel packages contain the Linux kernel, the core of any Linux operating system.
A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
On successful exploitation it allows remote attackers to corrupt memory and may allow execution of arbitrary code.
Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.
Refer to Red Hat security advisory RHSA-2016:2962 to address this issue and obtain more information.
Following are links for downloading patches to fix the vulnerabilities: