An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
{
"isDisputed": true
}[
{
"id": "CVE-2021-37600-adca5c5d",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "get_sem_elements",
"file": "sys-utils/ipcutils.c"
},
"source": "https://github.com/util-linux/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c",
"digest": {
"length": 1028.0,
"function_hash": "318753504687712674914122082290213738543"
},
"signature_type": "Function"
},
{
"id": "CVE-2021-37600-b3338a03",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "sys-utils/ipcutils.c"
},
"source": "https://github.com/util-linux/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c",
"digest": {
"line_hashes": [
"104820330773146188262023192517332611586",
"192859362915955476144306075005974388787",
"66667762537337788262415547746914441366",
"59143513466043020015328224767695389209"
],
"threshold": 0.9
},
"signature_type": "Line"
}
]