Linux kernel is vulnerable to use-after-free vulnerability. A local authenticated user with malicious intent could gain elevated privileges or cause a system hang via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
lists.openwall.net/netdev/2017/12/04/224
www.openwall.com/lists/oss-security/2017/12/05/1
www.securityfocus.com/bid/102056
access.redhat.com/articles/3431591
access.redhat.com/errata/RHSA-2018:0399
access.redhat.com/errata/RHSA-2018:0676
access.redhat.com/errata/RHSA-2018:1062
access.redhat.com/errata/RHSA-2018:1130
access.redhat.com/errata/RHSA-2018:1170
access.redhat.com/errata/RHSA-2018:1216
access.redhat.com/errata/RHSA-2018:1319
access.redhat.com/errata/RHSA-2018:3822
access.redhat.com/security/cve/CVE-2017-5754
access.redhat.com/security/updates/classification/#important
access.redhat.com/security/vulnerabilities/pop_ss
access.redhat.com/security/vulnerabilities/speculativeexecution
bugzilla.redhat.com/show_bug.cgi?id=1519781
help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
lists.debian.org/debian-lts-announce/2017/12/msg00004.html
usn.ubuntu.com/3581-1/
usn.ubuntu.com/3581-2/
usn.ubuntu.com/3581-3/
usn.ubuntu.com/3582-1/
usn.ubuntu.com/3582-2/
usn.ubuntu.com/3583-1/
usn.ubuntu.com/3583-2/
www.debian.org/security/2017/dsa-4073
www.debian.org/security/2018/dsa-4082
www.exploit-db.com/exploits/43234/