DEBIAN-CVE-2019-14875

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2019-14875
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2019-14875.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2019-14875
Upstream
Published
2020-03-19T16:15:13Z
Modified
2025-09-19T06:07:16Z
Summary
[none]
Details

In the __multiply function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. The access of _x[0] will trigger a null pointer dereference bug in case of a memory allocation failure.

References

Affected packages

Debian:11 / newlib

Package

Name
newlib
Purl
pkg:deb/debian/newlib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / newlib

Package

Name
newlib
Purl
pkg:deb/debian/newlib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / newlib

Package

Name
newlib
Purl
pkg:deb/debian/newlib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / newlib

Package

Name
newlib
Purl
pkg:deb/debian/newlib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}