The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
rhn.redhat.com/errata/RHSA-2017-0293.html
rhn.redhat.com/errata/RHSA-2017-0294.html
rhn.redhat.com/errata/RHSA-2017-0295.html
rhn.redhat.com/errata/RHSA-2017-0316.html
rhn.redhat.com/errata/RHSA-2017-0323.html
rhn.redhat.com/errata/RHSA-2017-0324.html
rhn.redhat.com/errata/RHSA-2017-0345.html
rhn.redhat.com/errata/RHSA-2017-0346.html
rhn.redhat.com/errata/RHSA-2017-0347.html
rhn.redhat.com/errata/RHSA-2017-0365.html
rhn.redhat.com/errata/RHSA-2017-0366.html
rhn.redhat.com/errata/RHSA-2017-0403.html
rhn.redhat.com/errata/RHSA-2017-0501.html
www.debian.org/security/2017/dsa-3791
www.openwall.com/lists/oss-security/2017/02/22/3
www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
www.securityfocus.com/bid/96310
www.securitytracker.com/id/1037876
access.redhat.com/errata/RHSA-2017:0932
access.redhat.com/errata/RHSA-2017:1209
github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4
source.android.com/security/bulletin/2017-07-01
www.exploit-db.com/exploits/41457/
www.exploit-db.com/exploits/41458/
www.tenable.com/security/tns-2017-07