### [CVE-2021-37600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments. ### POC #### Reference - https://github.com/karelzak/util-linux/issues/1395 #### Github - https://github.com/PajakAlexandre/wik-dps-tp02 - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/gp47/xef-scan-ex02