First published: Tue May 25 2021(Updated: )
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | =2.32 | |
GNU glibc | =2.33 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Netapp Cloud Backup | ||
NetApp E-Series SANtricity OS Controller | >=11.0<=11.70.1 | |
Netapp Solidfire Baseboard Management Controller Firmware | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H300e Firmware | ||
Netapp H300e | ||
Netapp H500e Firmware | ||
Netapp H500e | ||
Netapp H700e Firmware | ||
Netapp H700e | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-33574.
CVE-2021-33574 has a severity rating of 9.8 (Critical).
The affected software versions for CVE-2021-33574 are GNU glibc versions 2.32 and 2.33, Fedoraproject Fedora versions 33 and 34, Netapp Cloud Backup, NetApp E-Series SANtricity OS Controller versions between 11.0 and 11.70.1, Netapp Solidfire Baseboard Management Controller Firmware, Apple macOS Ventura, Apple macOS Big Sur, Apple macOS Monterey, Netapp H300e Firmware, Netapp H500e Firmware, Netapp H700e Firmware, Netapp H300e, Netapp H500e, Netapp H700e, and Debian Debian Linux version 10.0.
The use-after-free vulnerability in CVE-2021-33574 can lead to a denial of service (application crash) or possible arbitrary code execution.
Yes, patches have been released to address the vulnerability in affected software versions. It is recommended to update to the latest patched version provided by the software vendor.