JLSEC-2025-190

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-190.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-190.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2025-190
Upstream
Published
2025-10-27T18:23:36.019Z
Modified
2025-11-06T23:02:53.131364Z
Summary
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attac...
Details

An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.

Database specific
{
    "sources": [
        {
            "published": "2021-07-30T14:15:18.737Z",
            "id": "CVE-2021-37600",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37600",
            "imported": "2025-10-27T15:41:00.898Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-37600",
            "modified": "2024-11-21T06:15:30.107Z"
        }
    ],
    "license": "CC-BY-4.0"
}
References

Affected packages

Julia / util_linux_jll

Package

Name
util_linux_jll
Purl
pkg:julia/util_linux_jll?uuid=a762b42e-dc87-5958-a639-9c9eec9c0153

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.39.3+0

Julia / Libuuid_jll

Package

Name
Libuuid_jll
Purl
pkg:julia/Libuuid_jll?uuid=38a345b3-de98-5d2b-a5d3-14cd9215e700

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.39.3+0

Julia / Libmount_jll

Package

Name
Libmount_jll
Purl
pkg:julia/Libmount_jll?uuid=4b2f31a3-9ecc-558c-b454-b3730dcb73e9

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.39.3+0