** DISPUTED ** An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
References
Link | Resource |
---|---|
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c | Patch Third Party Advisory |
https://github.com/karelzak/util-linux/issues/1395 | Exploit Issue Tracking Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210902-0002/ | Third Party Advisory |
Information
Published : 2021-07-30 07:15
Updated : 2021-10-18 05:18
NVD link : CVE-2021-37600
Mitre link : CVE-2021-37600
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
kernel
- util-linux
netapp
- ontap_select_deploy_administration_utility