Linux kernel is vulnerable to out-of-bounds reads. This is because the IPv6 fragmentation implementation in the Linux kernel does not consider that the nexthdr field may be associated with an invalid option. Local users could cause a denial of service or possibly have unspecified other impact via crafted socket and send system calls.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2423496af35d94a87156b063ea5cedffc10a70a1
www.debian.org/security/2017/dsa-3886
www.securityfocus.com/bid/98577
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/index.html
access.redhat.com/errata/RHSA-2017:1842
access.redhat.com/errata/RHSA-2017:2077
access.redhat.com/errata/RHSA-2017:2669
access.redhat.com/errata/RHSA-2018:0169
access.redhat.com/security/cve/CVE-2016-10741
access.redhat.com/security/cve/CVE-2017-2584
access.redhat.com/security/cve/CVE-2017-5551
access.redhat.com/security/cve/CVE-2017-7495
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1377840
bugzilla.redhat.com/show_bug.cgi?id=1378172
bugzilla.redhat.com/show_bug.cgi?id=1389215
bugzilla.redhat.com/show_bug.cgi?id=1400188
bugzilla.redhat.com/show_bug.cgi?id=1414052
bugzilla.redhat.com/show_bug.cgi?id=1421801
bugzilla.redhat.com/show_bug.cgi?id=1421810
bugzilla.redhat.com/show_bug.cgi?id=1425780
bugzilla.redhat.com/show_bug.cgi?id=1426661
bugzilla.redhat.com/show_bug.cgi?id=1427626
bugzilla.redhat.com/show_bug.cgi?id=1427647
bugzilla.redhat.com/show_bug.cgi?id=1427991
bugzilla.redhat.com/show_bug.cgi?id=1428890
bugzilla.redhat.com/show_bug.cgi?id=1428943
bugzilla.redhat.com/show_bug.cgi?id=1429610
bugzilla.redhat.com/show_bug.cgi?id=1429640
bugzilla.redhat.com/show_bug.cgi?id=1429951
bugzilla.redhat.com/show_bug.cgi?id=1429977
bugzilla.redhat.com/show_bug.cgi?id=1430023
bugzilla.redhat.com/show_bug.cgi?id=1430038
bugzilla.redhat.com/show_bug.cgi?id=1430074
bugzilla.redhat.com/show_bug.cgi?id=1430353
bugzilla.redhat.com/show_bug.cgi?id=1430926
bugzilla.redhat.com/show_bug.cgi?id=1430946
bugzilla.redhat.com/show_bug.cgi?id=1431104
bugzilla.redhat.com/show_bug.cgi?id=1432118
bugzilla.redhat.com/show_bug.cgi?id=1434616
bugzilla.redhat.com/show_bug.cgi?id=1438512
bugzilla.redhat.com/show_bug.cgi?id=1441552
bugzilla.redhat.com/show_bug.cgi?id=1452240
bugzilla.redhat.com/show_bug.cgi?id=1459056
github.com/torvalds/linux/commit/2423496af35d94a87156b063ea5cedffc10a70a1
help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
patchwork.ozlabs.org/patch/763117/