CVE Vulnerabilities

CVE-2019-14871

NULL Pointer Dereference

Published: Mar 18, 2020 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The REENT_CHECK macro (see newlib/libc/include/sys/reent.h) as used by REENT_CHECK_TM, REENT_CHECK_MISC, REENT_CHECK_MP and other newlib macros in versions prior to 3.3.0, does not check for memory allocation problems when the DEBUG flag is unset (as is the case in production firmware builds).

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Newlib Newlib_project * 3.3.0 (excluding)
Gcc-snapshot Ubuntu bionic *
Gcc-snapshot Ubuntu focal *
Gcc-snapshot Ubuntu jammy *
Gcc-snapshot Ubuntu trusty *
Gcc-snapshot Ubuntu xenial *
Newlib Ubuntu bionic *
Newlib Ubuntu eoan *
Newlib Ubuntu esm-apps/bionic *
Newlib Ubuntu esm-apps/xenial *
Newlib Ubuntu focal *
Newlib Ubuntu groovy *
Newlib Ubuntu hirsute *
Newlib Ubuntu impish *
Newlib Ubuntu jammy *
Newlib Ubuntu kinetic *
Newlib Ubuntu trusty *
Newlib Ubuntu upstream *
Newlib Ubuntu xenial *

Potential Mitigations

References