An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
References
Link | Resource |
---|---|
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c | Patch Third Party Advisory |
https://github.com/karelzak/util-linux/issues/1395 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html | |
https://security.gentoo.org/glsa/202401-08 | |
https://security.netapp.com/advisory/ntap-20210902-0002/ | Third Party Advisory |
Configurations
History
07 Apr 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Jan 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments. |
07 Nov 2023, 03:36
Type | Values Removed | Values Added |
---|---|---|
Summary | An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments |
Information
Published : 2021-07-30 14:15
Updated : 2024-08-04 02:15
NVD link : CVE-2021-37600
Mitre link : CVE-2021-37600
CVE.ORG link : CVE-2021-37600
JSON object : View
Products Affected
netapp
- ontap_select_deploy_administration_utility
kernel
- util-linux
CWE
CWE-190
Integer Overflow or Wraparound