First published: Fri Jan 11 2019(Updated: )
A vulnerability was found in libsolv through 0.7.2. There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a that will cause a denial of service. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - CVE-2018-20532 libsolv: NULL pointer dereference in function testcase_read [rhel-8]" href="show_bug.cgi?id=1652605">https://bugzilla.redhat.com/show_bug.cgi?id=1652605</a> Upstream Patch: <a href="https://github.com/openSUSE/libsolv/pull/291">https://github.com/openSUSE/libsolv/pull/291</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libsolv | <=0.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1665532 is classified as a denial of service vulnerability due to a NULL pointer dereference.
To fix REDHAT-BUG-1665532, update the libsolv package to a version later than 0.7.2.
REDHAT-BUG-1665532 affects the openSUSE libsolv package version up to and including 0.7.2.
The vulnerability in REDHAT-BUG-1665532 is caused by a NULL pointer dereference in the function testcase_read in libsolvext.a.
There is no known workaround for REDHAT-BUG-1665532 other than applying the software update.