CVE-2021-37600
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
30/07/2021
Last modified:
04/08/2024
Description
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
1.20
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:* | 2.37.1 (including) | |
| cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
- https://github.com/karelzak/util-linux/issues/1395
- https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
- https://security.gentoo.org/glsa/202401-08
- https://security.netapp.com/advisory/ntap-20210902-0002/



