CVE-2019-14871
Published: 18 March 2020
The REENT_CHECK macro (see newlib/libc/include/sys/reent.h) as used by REENT_CHECK_TM, REENT_CHECK_MISC, REENT_CHECK_MP and other newlib macros in versions prior to 3.3.0, does not check for memory allocation problems when the DEBUG flag is unset (as is the case in production firmware builds).
Priority
Status
Package | Release | Status |
---|---|---|
gcc-snapshot Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
focal |
Ignored
(end of life, was needs-triage)
|
|
jammy |
Ignored
(end of life, was needs-triage)
|
|
lunar |
Not vulnerable
(code not present)
|
|
mantic |
Not vulnerable
(code not present)
|
|
noble |
Not vulnerable
(code not present)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Not vulnerable
(code not present)
|
|
xenial |
Not vulnerable
(code not present)
|
|
newlib Launchpad, Ubuntu, Debian |
bionic |
Needed
|
eoan |
Ignored
(end of life)
|
|
focal |
Ignored
(end of life, was needs-triage)
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Ignored
(end of life)
|
|
impish |
Ignored
(end of life)
|
|
jammy |
Ignored
(end of life, was needs-triage)
|
|
kinetic |
Ignored
(end of life, was needs-triage)
|
|
lunar |
Not vulnerable
(3.3.0-1.3)
|
|
mantic |
Not vulnerable
(3.3.0-1.3)
|
|
noble |
Not vulnerable
(3.3.0-1.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(3.3.0)
|
|
xenial |
Needed
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |