Linux kernel built with Extended Verification Module(EVM) and configured properly, is vulnerable to a NULL pointer de-reference flaw, caused by accessing extended attribute routines of sockfs inode object.
An unprivileged user/program could use this to crash the kernel, resulting in DoS.
Upstream fix:
-> https://git.kernel.org/linus/a67adb997419fb53540d4a4f79c6471c60bc69b6
Reference:
-> https://bugzilla.redhat.com/show_bug.cgi?id=913266