First published: Fri Dec 28 2018(Updated: )
A vulnerability was found in libsolv through 0.7.2. There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a that will cause a denial of service. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - CVE-2018-20532 libsolv: NULL pointer dereference in function testcase_read [rhel-8]" href="show_bug.cgi?id=1652605">https://bugzilla.redhat.com/show_bug.cgi?id=1652605</a> Upstream Patch: <a href="https://github.com/openSUSE/libsolv/pull/291">https://github.com/openSUSE/libsolv/pull/291</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opensuse Libsolv | <=0.7.2 | |
Canonical Ubuntu Linux | =18.10 | |
debian/libsolv | 0.7.17-1+deb11u1 0.7.23-1+deb12u1 0.7.30-1 0.7.30-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20532 is a vulnerability that allows a NULL pointer dereference in libsolv through 0.7.2, leading to a denial of service.
The affected software includes libsolv 0.6.35-2+deb10u1, libsolv 0.6.35-2ubuntu0.18.10.1, libsolv 0.6.5-2ubuntu1, and more.
CVE-2018-20532 has a severity rating of 6.5 (medium).
To fix CVE-2018-20532, update to libsolv version 0.7.17-1, 0.7.23-1, or 0.7.25-1.
You can find more information about CVE-2018-20532 at the following references: http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html, https://access.redhat.com/errata/RHSA-2019:2290, and https://bugzilla.redhat.com/show_bug.cgi?id=1652605.