kernel is vulnerable to arbitrary code execution. The vulnerability exists as the kernel improperly handles options data, causing arbitrary code execution through sendmsg system call.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39
rhn.redhat.com/errata/RHSA-2016-0855.html
rhn.redhat.com/errata/RHSA-2016-2574.html
rhn.redhat.com/errata/RHSA-2016-2584.html
rhn.redhat.com/errata/RHSA-2016-2695.html
source.android.com/security/bulletin/2016-08-01.html
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
www.securityfocus.com/bid/92227
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Release_Notes/index.html
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.8_Technical_Notes/index.html
access.redhat.com/security/cve/CVE-2016-3841
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1066751
bugzilla.redhat.com/show_bug.cgi?id=1197875
bugzilla.redhat.com/show_bug.cgi?id=1225359
bugzilla.redhat.com/show_bug.cgi?id=1242239
bugzilla.redhat.com/show_bug.cgi?id=1248507
bugzilla.redhat.com/show_bug.cgi?id=1254020
bugzilla.redhat.com/show_bug.cgi?id=1259870
bugzilla.redhat.com/show_bug.cgi?id=1310661
bugzilla.redhat.com/show_bug.cgi?id=697750
bugzilla.redhat.com/show_bug.cgi?id=723722
bugzilla.redhat.com/show_bug.cgi?id=889368
github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
rhn.redhat.com/errata/RHSA-2016-0855.html