The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
www.securityfocus.com/bid/103023
access.redhat.com/errata/RHSA-2018:0654
access.redhat.com/errata/RHSA-2018:0676
access.redhat.com/errata/RHSA-2018:1062
github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
lists.debian.org/debian-lts-announce/2018/05/msg00000.html
usn.ubuntu.com/3619-1/
usn.ubuntu.com/3619-2/
usn.ubuntu.com/3697-1/
usn.ubuntu.com/3697-2/
usn.ubuntu.com/3698-1/
usn.ubuntu.com/3698-2/
www.debian.org/security/2018/dsa-4187
www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15