First published: Thu Mar 19 2020(Updated: )
In the __multiply function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. The access of _x[0] will trigger a null pointer dereference bug in case of a memory allocation failure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Newlib Project Newlib | <3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-14875 is rated as medium with a CVSS score of 6.5.
To fix CVE-2019-14875, users should update to newlib libc library version 3.3.0 or later.
CVE-2019-14875 affects all versions of newlib libc library prior to 3.3.0.
The CWE associated with CVE-2019-14875 is CWE-476.