A vulnerability was found in the memory management of the affected operating systems. This vulnerability can lead to privilege escalation on these systems by corrupting memory and executing arbitrary code. A local attacker may leverage this vulnerability in the affected systems to gain root privileges.
The following is only a sample list of Linux systems that are affected. The list is not exhaustive and it is strongly recommended to consult the product vendors if the used Linux systems are affected.
Successful exploitation could lead to elevation of privilege of a vulnerable system.
The vulnerability is fixed in some of the Linux distributions, such as CentOS, Debian, Oracle Linux, RedHat, SUSE and Ubuntu. System administrators should check with their product vendors to confirm if their Linux systems are affected and the availability of patches, and if so, apply the patches or follow the recommendations provided by the product vendors to mitigate the risk.
https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a87938b2e246b81b4fb713edb371a9fa3c5c3c86
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000253