The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
{ "vanir_signatures": [ { "target": { "file": "kernel/futex.c" }, "source": "https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a", "digest": { "threshold": 0.9, "line_hashes": [ "161148730817392128664427034176206467111", "200669221905129361914185275616428096150", "188957251347037490046194070584207408597" ] }, "id": "CVE-2018-6927-1107c801", "deprecated": false, "signature_type": "Line", "signature_version": "v1" }, { "target": { "function": "futex_requeue", "file": "kernel/futex.c" }, "source": "https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a", "digest": { "length": 2952.0, "function_hash": "87111469326776462785404180427219495706" }, "id": "CVE-2018-6927-1f42b2b1", "deprecated": false, "signature_type": "Function", "signature_version": "v1" }, { "target": { "file": "kernel/futex.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a", "digest": { "threshold": 0.9, "line_hashes": [ "161148730817392128664427034176206467111", "200669221905129361914185275616428096150", "188957251347037490046194070584207408597" ] }, "id": "CVE-2018-6927-8d407ffc", "deprecated": false, "signature_type": "Line", "signature_version": "v1" }, { "target": { "function": "futex_requeue", "file": "kernel/futex.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a", "digest": { "length": 2952.0, "function_hash": "87111469326776462785404180427219495706" }, "id": "CVE-2018-6927-c30d83af", "deprecated": false, "signature_type": "Function", "signature_version": "v1" } ] }