CVE Vulnerabilities

CVE-2019-14878

NULL Pointer Dereference

Published: Mar 19, 2020 | Modified: Mar 24, 2020
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

In the __d2b function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. Accessing _x will trigger a null pointer dereference bug in case of a memory allocation failure.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Newlib Newlib_project * 3.3.0 (excluding)
Gcc-snapshot Ubuntu bionic *
Gcc-snapshot Ubuntu focal *
Gcc-snapshot Ubuntu jammy *
Gcc-snapshot Ubuntu trusty *
Gcc-snapshot Ubuntu xenial *
Newlib Ubuntu bionic *
Newlib Ubuntu eoan *
Newlib Ubuntu esm-apps/bionic *
Newlib Ubuntu esm-apps/xenial *
Newlib Ubuntu focal *
Newlib Ubuntu groovy *
Newlib Ubuntu hirsute *
Newlib Ubuntu impish *
Newlib Ubuntu jammy *
Newlib Ubuntu kinetic *
Newlib Ubuntu trusty *
Newlib Ubuntu upstream *
Newlib Ubuntu xenial *

Potential Mitigations

References