An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:23:01.417Z
Reserved: 2021-07-28T00:00:00
Link: CVE-2021-37600

No data.

Status : Modified
Published: 2021-07-30T14:15:18.737
Modified: 2024-11-21T06:15:30.107
Link: CVE-2021-37600
