Linux kernel is vulnerable to memory corruption vulnerability. This is because the append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges.
seclists.org/oss-sec/2017/q3/277
www.debian.org/security/2017/dsa-3981
www.securityfocus.com/bid/100262
www.securitytracker.com/id/1039162
access.redhat.com/errata/RHSA-2017:2918
access.redhat.com/errata/RHSA-2017:2930
access.redhat.com/errata/RHSA-2017:2931
access.redhat.com/errata/RHSA-2017:3200
access.redhat.com/security/updates/classification/#important
github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
www.exploit-db.com/exploits/45147/