Linux kernel is vulnerable to arbitrary code execution attacks. This occurs where the kernel truncated the value used to indicate the size of a buffer which it would later become zero using an untruncated value. This could corrupt memory outside of the original allocation.
www.securityfocus.com/bid/100658
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html
access.redhat.com/errata/RHSA-2018:0676
access.redhat.com/errata/RHSA-2018:1062
access.redhat.com/errata/RHSA-2018:1130
access.redhat.com/errata/RHSA-2018:1170
access.redhat.com/security/cve/CVE-2017-13305
access.redhat.com/security/cve/CVE-2017-15274
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1292927
bugzilla.redhat.com/show_bug.cgi?id=1401061
bugzilla.redhat.com/show_bug.cgi?id=1430418
bugzilla.redhat.com/show_bug.cgi?id=1448770
bugzilla.redhat.com/show_bug.cgi?id=1452589
bugzilla.redhat.com/show_bug.cgi?id=1462329
bugzilla.redhat.com/show_bug.cgi?id=1500894
bugzilla.redhat.com/show_bug.cgi?id=1503749
bugzilla.redhat.com/show_bug.cgi?id=1506255
bugzilla.redhat.com/show_bug.cgi?id=1507270
bugzilla.redhat.com/show_bug.cgi?id=1509264
bugzilla.redhat.com/show_bug.cgi?id=1518274
bugzilla.redhat.com/show_bug.cgi?id=1518638
source.android.com/security/bulletin/2017-09-01