Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
http://secunia.com/advisories/59386
http://secunia.com/advisories/59599
http://www.debian.org/security/2014/dsa-2926
http://www.openwall.com/lists/oss-security/2014/04/11/4
http://www.securityfocus.com/bid/66779
http://www.securitytracker.com/id/1030769