107
VMScore

CVE-2021-37600

Published: 30/07/2021 Updated: 11/04/2024
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 107
Vector: AV:L/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Summary

An integer overflow in util-linux up to and including 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kernel util-linux

netapp ontap select deploy administration utility -

Vendor Advisories

Debian Bug report logs - #991619 util-linux: CVE-2021-37600: Potential integer overflow in ipcutilsc Package: src:util-linux; Maintainer for src:util-linux is util-linux packagers <util-linux@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 28 Jul 2021 18:51:01 UTC Severity: imp ...
** DISPUTED ** An integer overflow in util-linux through 2371 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments (CVE-2021-37600) ...
An integer overflow in util-linux through 2371 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file ...