An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
{ "isDisputed": true }
[ { "id": "CVE-2021-37600-adca5c5d", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "target": { "function": "get_sem_elements", "file": "sys-utils/ipcutils.c" }, "digest": { "function_hash": "318753504687712674914122082290213738543", "length": 1028.0 }, "source": "https://github.com/util-linux/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" }, { "id": "CVE-2021-37600-b3338a03", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "target": { "file": "sys-utils/ipcutils.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "104820330773146188262023192517332611586", "192859362915955476144306075005974388787", "66667762537337788262415547746914441366", "59143513466043020015328224767695389209" ] }, "source": "https://github.com/util-linux/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c" } ]