Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-37600

Опубликовано: 27 июл. 2021
Источник: redhat
CVSS3: 4.7

Описание

An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.

An integer truncation flaw was found in util-linux that potentially causes a buffer overflow if an attacker can use system resources that lead to a large number in the /proc/sysvipc/sem file. The highest threat from this vulnerability is to system availability.

Отчет

This vulnerability is only present in the 32-bit builds of the util-linux package. The standard 64-bit builds (eg x86_64) are not affected. Red Hat Enterprise Linux 8 is marked "Not Affected" since the impacted package is not available as a 32-bit build. In order for exploit to be possible the "kernel.sem" limits controlled by sysctl must be raised to an abnormally high number. Default values on Red Hat Enterprise Linux are too low to make exploitation possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7util-linuxOut of support scope
Red Hat Enterprise Linux 8util-linuxNot affected
Red Hat Enterprise Linux 9util-linuxNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1987320util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.

CVSS3: 5.5
nvd
больше 4 лет назад

An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.

CVSS3: 5.5
msrc
больше 4 лет назад

An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments and possibly in all realistic environments.

CVSS3: 5.5
debian
больше 4 лет назад

An integer overflow in util-linux through 2.37.1 can potentially cause ...

suse-cvrf
больше 4 лет назад

Security update for util-linux

4.7 Medium

CVSS3