CVE-2018-6927

Current Description

The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.

Basic Data

PublishedFebruary 12, 2018
Last ModifiedMarch 06, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-190
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score4.6
SeverityMEDIUM
Exploitability Score3.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

CVSS 3 - Version3.0
CVSS 3 - Vector StringCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 3 - Attack VectorLOCAL
CVSS 3 - Attack ComplexityLOW
CVSS 3 - Privileges RequiredLOW
CVSS 3 - User InteractionNONE
CVSS 3 - ScopeUNCHANGED
CVSS 3 - Confidentiality ImpactHIGH
CVSS 3 - Integrity ImpactHIGH
CVSS 3 - Availability ImpactHIGH
CVSS 3 - Base Score7.8
CVSS 3 - Base SeverityHIGH
Exploitability Score1.8
Base SeverityHIGH

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********4.14.15
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux12.04***esm***
    2.3OSCanonicalUbuntu Linux14.04***lts***
    2.3OSCanonicalUbuntu Linux16.04***lts***
    2.3OSCanonicalUbuntu Linux17.10*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux7.0*******
    2.3OSDebianDebian Linux8.0*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRedhatVirtualization Host4.0*******
    2.3OSRedhatEnterprise Linux Desktop7.0*******
    2.3OSRedhatEnterprise Linux Server7.0*******
    2.3OSRedhatEnterprise Linux Server Aus7.6*******
    2.3OSRedhatEnterprise Linux Server Eus7.6*******
    2.3OSRedhatEnterprise Linux Server Tus7.6*******
    2.3OSRedhatEnterprise Linux Workstation7.0*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 7.0, 8.0
Canonical Ubuntu Linux 12.04, 14.04, 16.04, 17.10
Redhat Enterprise Linux Workstation 7.0
Redhat Virtualization Host 4.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server 7.0
Linux Linux Kernel *

References

NameSourceURLTags
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4ahttp://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2MISCPatch Third Party Advisory
103023http://www.securityfocus.com/bid/103023BIDThird Party Advisory VDB Entry
RHSA-2018:0654https://access.redhat.com/errata/RHSA-2018:0654REDHATThird Party Advisory
RHSA-2018:0676https://access.redhat.com/errata/RHSA-2018:0676REDHATThird Party Advisory
RHSA-2018:1062https://access.redhat.com/errata/RHSA-2018:1062REDHATThird Party Advisory
https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4ahttps://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4aMISCPatch Third Party Advisory
[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security updatehttps://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlMLISTMailing List Third Party Advisory
USN-3619-1https://usn.ubuntu.com/3619-1/UBUNTUThird Party Advisory
USN-3619-2https://usn.ubuntu.com/3619-2/UBUNTUThird Party Advisory
USN-3697-1https://usn.ubuntu.com/3697-1/UBUNTUThird Party Advisory
USN-3697-2https://usn.ubuntu.com/3697-2/UBUNTUThird Party Advisory
USN-3698-1https://usn.ubuntu.com/3698-1/UBUNTUThird Party Advisory
USN-3698-2https://usn.ubuntu.com/3698-2/UBUNTUThird Party Advisory
DSA-4187https://www.debian.org/security/2018/dsa-4187DEBIANThird Party Advisory
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15MISCRelease Notes Vendor Advisory