CVE Vulnerabilities

CVE-2019-20202

Release of Invalid Pointer or Reference

Published: Dec 31, 2019 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content() tries to use realloc on a block that was not allocated, leading to an invalid free and segmentation fault.

Weakness

The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.

Affected Software

NameVendorStart VersionEnd Version
EzxmlEzxml_project0.8.3 (including)0.8.6 (including)
MapcacheUbuntubionic*
MapcacheUbuntudevel*
MapcacheUbuntuesm-apps/bionic*
MapcacheUbuntuesm-apps/focal*
MapcacheUbuntuesm-apps/jammy*
MapcacheUbuntuesm-apps/noble*
MapcacheUbuntuesm-apps/xenial*
MapcacheUbuntufocal*
MapcacheUbuntuhirsute*
MapcacheUbuntuimpish*
MapcacheUbuntujammy*
MapcacheUbuntukinetic*
MapcacheUbuntulunar*
MapcacheUbuntumantic*
MapcacheUbuntunoble*
MapcacheUbuntuoracular*
MapcacheUbuntuplucky*
MapcacheUbuntuquesting*
MapcacheUbuntutrusty*
MapcacheUbuntuupstream*
MapcacheUbuntuxenial*
NavitUbuntubionic*
NavitUbuntufocal*
NavitUbuntuhirsute*
NavitUbuntuimpish*
NavitUbuntukinetic*
NavitUbuntulunar*
NavitUbuntumantic*
NavitUbuntuoracular*
NavitUbuntuplucky*
NavitUbuntutrusty*
NavitUbuntuxenial*
NetcdfUbuntubionic*
NetcdfUbuntuesm-apps/focal*
NetcdfUbuntuesm-apps/jammy*
NetcdfUbuntufocal*
NetcdfUbuntuhirsute*
NetcdfUbuntuimpish*
NetcdfUbuntujammy*
NetcdfUbuntukinetic*
NetcdfUbuntulunar*
NetcdfUbuntumantic*
NetcdfUbuntutrusty*
NetcdfUbuntutrusty/esm*
NetcdfUbuntuupstream*
NetcdfUbuntuxenial*
Netcdf-parallelUbuntuesm-apps/focal*
Netcdf-parallelUbuntuesm-apps/jammy*
Netcdf-parallelUbuntufocal*
Netcdf-parallelUbuntuhirsute*
Netcdf-parallelUbuntuimpish*
Netcdf-parallelUbuntujammy*
Netcdf-parallelUbuntukinetic*
Netcdf-parallelUbuntulunar*
Netcdf-parallelUbuntumantic*
Netcdf-parallelUbuntuoracular*
Netcdf-parallelUbuntutrusty*
Netcdf-parallelUbuntuupstream*
Netcdf-parallelUbuntuxenial*
ScilabUbuntubionic*
ScilabUbuntudevel*
ScilabUbuntuesm-apps/bionic*
ScilabUbuntuesm-apps/focal*
ScilabUbuntuesm-apps/jammy*
ScilabUbuntuesm-apps/noble*
ScilabUbuntufocal*
ScilabUbuntuhirsute*
ScilabUbuntuimpish*
ScilabUbuntujammy*
ScilabUbuntukinetic*
ScilabUbuntulunar*
ScilabUbuntumantic*
ScilabUbuntunoble*
ScilabUbuntuoracular*
ScilabUbuntuplucky*
ScilabUbuntuquesting*
ScilabUbuntutrusty*
ScilabUbuntuxenial*

Extended Description

This weakness can take several forms, such as:

Potential Mitigations

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, glibc in Linux provides protection against free of invalid pointers.

References