An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "bsdextrautils"
},
{
"binary_version": "1:2.37.2-4ubuntu2",
"binary_name": "bsdutils"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "eject"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "fdisk"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libblkid-dev"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libblkid1"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libfdisk-dev"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libfdisk1"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libmount-dev"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libmount1"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libsmartcols-dev"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libsmartcols1"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "libuuid1"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "mount"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "rfkill"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "util-linux"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "util-linux-locales"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "uuid-dev"
},
{
"binary_version": "2.37.2-4ubuntu2",
"binary_name": "uuid-runtime"
}
]
}