Linux kernel is vulnerable to denial of service(DoS) attacks. This occurs when gcc stack protector is enabled and uses an incorrect buffer size for certain timeout data allowing the attackers to cause a system crash by reading the /proc/keys file.
rhn.redhat.com/errata/RHSA-2017-0817.html
www.openwall.com/lists/oss-security/2016/10/13/5
www.securityfocus.com/bid/93544
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html
access.redhat.com/errata/RHSA-2017:0817
access.redhat.com/errata/RHSA-2017:1842
access.redhat.com/errata/RHSA-2017:2077
access.redhat.com/errata/RHSA-2017:2669
access.redhat.com/security/cve/CVE-2017-5551
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1325766
bugzilla.redhat.com/show_bug.cgi?id=1373966
bugzilla.redhat.com/show_bug.cgi?id=847106
source.android.com/security/bulletin/2017-01-01.html