An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
{
"sources": [
{
"published": "2021-07-30T14:15:18.737Z",
"id": "CVE-2021-37600",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37600",
"imported": "2025-10-27T15:41:00.898Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2021-37600",
"modified": "2024-11-21T06:15:30.107Z"
}
],
"license": "CC-BY-4.0"
}