First published: Thu Aug 12 2021(Updated: )
In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | <=2.34 | |
Fedoraproject Fedora | =35 | |
Oracle Communications Cloud Native Core Binding Support Function | =22.1.3 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =22.1.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.1.2 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.2.0 | |
Oracle Communications Cloud Native Core Security Edge Protection Proxy | =22.1.1 | |
Oracle Communications Cloud Native Core Unified Data Repository | =22.2.0 | |
Oracle Enterprise Operations Monitor | =4.3 | |
Oracle Enterprise Operations Monitor | =4.4 | |
Oracle Enterprise Operations Monitor | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38604 is a vulnerability in the GNU C Library (glibc) that mishandles certain NOTIFY_REMOVED data, resulting in a NULL pointer dereference.
CVE-2021-38604 has a severity rating of 7.5 (high).
GNU glibc up to version 2.34, Fedora 35, Oracle Communications Cloud Native Core Binding Support Function 22.1.3, Oracle Communications Cloud Native Core Network Function Cloud Native Environment 22.1.0, Oracle Communications Cloud Native Core Network Repository Function 22.1.2 and 22.2.0, VMware Spring Cloud Gateway 22.1.1, Oracle Communications Cloud Native Core Unified Data Repository 22.2.0, Oracle Enterprise Operations Monitor 4.3, 4.4, and 5.0.
Apply the necessary patches or updates provided by the respective software vendors to fix CVE-2021-38604.
You can find more information about CVE-2021-38604 in the following references: [1] [2] [3].