linux kernel is vulnerable to incorrect access control. This occurs when handling clearing of attributes on /proc/pid/attr from the shell by ignoring terminating newlines and treating an attribute value that begins with a NUL or newline as an attempt to clear the attribute causing the system to attempt to access unmapped kernel memory resulting in an application crash.
www.securityfocus.com/bid/96272
access.redhat.com/errata/RHSA-2017:0931
access.redhat.com/errata/RHSA-2017:0932
access.redhat.com/errata/RHSA-2017:0933
access.redhat.com/security/cve/CVE-2017-2618
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1419916
bugzilla.redhat.com/show_bug.cgi?id=1430749
bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618
git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125
marc.info/?l=selinux&m=148588165923772&w=2
www.debian.org/security/2017/dsa-3791