An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
{
"binaries": [
{
"binary_name": "bsdextrautils",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "bsdutils",
"binary_version": "1:2.37.2-4ubuntu2"
},
{
"binary_name": "eject",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "fdisk",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libblkid-dev",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libblkid1",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libfdisk-dev",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libfdisk1",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libmount-dev",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libmount1",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libsmartcols-dev",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libsmartcols1",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "libuuid1",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "mount",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "rfkill",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "util-linux",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "util-linux-locales",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "uuid-dev",
"binary_version": "2.37.2-4ubuntu2"
},
{
"binary_name": "uuid-runtime",
"binary_version": "2.37.2-4ubuntu2"
}
],
"availability": "No subscription required"
}