{"id":"CVE-2021-37600","details":"An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.","modified":"2026-04-10T04:35:57.075301Z","published":"2021-07-30T14:15:18.737Z","related":["MGASA-2022-0076","SUSE-SU-2021:3463-1","SUSE-SU-2021:3474-1","SUSE-SU-2021:3475-1","SUSE-SU-2021:3523-1","SUSE-SU-2022:1103-1","SUSE-SU-2022:1105-1","SUSE-SU-2022:1108-1","openSUSE-SU-2021:1440-1","openSUSE-SU-2021:3474-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-08"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210902-0002/"},{"type":"REPORT","url":"https://github.com/karelzak/util-linux/issues/1395"},{"type":"FIX","url":"https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/karelzak/util-linux","events":[{"introduced":"0"},{"last_affected":"bb954f765845b0346679a25383da9a5d9a063e84"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.37.1"}]}},{"type":"GIT","repo":"https://github.com/util-linux/util-linux","events":[{"introduced":"0"},{"fixed":"1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c"}]}],"versions":["v2.10f","v2.10m","v2.10s","v2.11b","v2.11f","v2.11m","v2.11n","v2.11o","v2.11q","v2.11r","v2.11t","v2.11u","v2.11v","v2.11w","v2.11x","v2.11y","v2.12","v2.12a","v2.12b","v2.12d","v2.12h","v2.12i","v2.12j","v2.12k","v2.12l","v2.12m","v2.12o","v2.12p","v2.12pre","v2.12q","v2.12q-pre1","v2.12q-pre2","v2.12r","v2.12r-pre1","v2.13","v2.13-pre1","v2.13-pre2","v2.13-pre3","v2.13-pre4","v2.13-pre5","v2.13-pre6","v2.13-pre7","v2.13-rc1","v2.13-rc2","v2.13-rc3","v2.14","v2.14-rc1","v2.14-rc2","v2.14-rc3","v2.15","v2.15-rc1","v2.15-rc2","v2.16","v2.16-rc1","v2.16-rc2","v2.17","v2.17-rc1","v2.17-rc2","v2.17-rc3","v2.18","v2.18-rc1","v2.18-rc2","v2.19","v2.19-rc1","v2.19-rc2","v2.19-rc3","v2.2","v2.20","v2.20-rc1","v2.20-rc2","v2.21","v2.21-rc1","v2.21-rc2","v2.22","v2.22-rc1","v2.22-rc2","v2.23","v2.23-rc1","v2.23-rc2","v2.24","v2.24-rc1","v2.24-rc2","v2.25","v2.25-rc1","v2.25-rc2","v2.26","v2.26-rc1","v2.26-rc2","v2.27","v2.27-rc1","v2.27-rc2","v2.28","v2.28-rc1","v2.28-rc2","v2.29","v2.29-rc1","v2.29-rc2","v2.30","v2.30-rc1","v2.30-rc2","v2.31","v2.31-rc1","v2.31-rc2","v2.32","v2.32-rc1","v2.32-rc2","v2.33","v2.33-rc1","v2.33-rc2","v2.34","v2.34-rc1","v2.34-rc2","v2.35","v2.35-rc1","v2.35-rc2","v2.36","v2.36-rc1","v2.36-rc2","v2.37","v2.37-rc1","v2.37-rc2","v2.37.1","v2.5","v2.7.1","v2.8","v2.9i","v2.9v"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-37600.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}