CVE-2021-37600

An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
VendorProductVersion
kernelutil-linux
𝑥
≤ 2.37.1
netappontap_select_deploy_administration_utility
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
util-linux
bullseye (security)
2.36.1-8+deb11u2
fixed
bullseye
2.36.1-8+deb11u2
fixed
stretch
no-dsa
bookworm
2.38.1-5+deb12u1
fixed
bookworm (security)
2.38.1-5+deb12u1
fixed
trixie
2.40.2-9
fixed
sid
2.40.2-10
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
util-linux
jammy
Fixed 2.37.2-4ubuntu2
released
impish
not-affected
hirsute
ignored
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected