Source: util-linux
Version: 2.36.1-7
Severity: important
Tags: security upstream
Forwarded: https://github.com/karelzak/util-linux/issues/1395
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for util-linux.

CVE-2021-37600[0]:
| An integer overflow in util-linux through 2.37.1 can potentially cause
| a buffer overflow if an attacker were able to use system resources in
| a way that leads to a large number in the /proc/sysvipc/sem file.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-37600
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
[1] https://github.com/karelzak/util-linux/issues/1395
[2] 
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to