UBUNTU-CVE-2019-14873

Source
https://ubuntu.com/security/CVE-2019-14873
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-14873.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-14873
Upstream
Published
2020-03-19T16:15:00Z
Modified
2025-07-18T16:45:15Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In the __multadd function of the newlib libc library, prior to versions 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. This will trigger a null pointer dereference bug in case of a memory allocation failure.

References

Affected packages

Ubuntu:Pro:16.04:LTS / newlib

Package

Name
newlib
Purl
pkg:deb/ubuntu/newlib@2.2.0+git20150830.5a3d536-1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.1.0+git20141201.db59ff3-2
2.2.0+git20150830.5a3d536-1

Ubuntu:Pro:18.04:LTS / newlib

Package

Name
newlib
Purl
pkg:deb/ubuntu/newlib@2.4.0.20160527-3ubuntu0.1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.4.0.20160527-2
2.4.0.20160527-3
2.4.0.20160527-3ubuntu0.1