Newlib Project

Newlib

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.41%
  • Published 20.08.2024 15:15:20
  • Last modified 21.08.2024 15:48:31

An issue in newlib v.4.3.0 allows an attacker to execute arbitrary code via the time unit scaling in the _gettimeofday function.

  • EPSS 0.23%
  • Published 05.03.2021 21:15:13
  • Last modified 21.11.2024 06:21:27

A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buf...

Exploit
  • EPSS 0.31%
  • Published 19.03.2020 16:15:14
  • Last modified 21.11.2024 04:27:35

In the __d2b function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. Accessing _x will tr...

Exploit
  • EPSS 0.4%
  • Published 19.03.2020 16:15:13
  • Last modified 21.11.2024 04:27:34

In the __i2b function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. The access of _ x[0]...

Exploit
  • EPSS 0.4%
  • Published 19.03.2020 16:15:13
  • Last modified 21.11.2024 04:27:34

In the __multiply function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. The access of _...

Exploit
  • EPSS 0.31%
  • Published 19.03.2020 16:15:13
  • Last modified 21.11.2024 04:27:34

In the __lshift function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. The access to b1 ...

Exploit
  • EPSS 0.31%
  • Published 19.03.2020 16:15:13
  • Last modified 21.11.2024 04:27:34

In the __mdiff function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate big integers, however no check is performed to verify if the allocation succeeded or not. The access to _wds ...

Exploit
  • EPSS 0.4%
  • Published 19.03.2020 16:15:12
  • Last modified 21.11.2024 04:27:33

In the __multadd function of the newlib libc library, prior to versions 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. This will trigger a ...

Exploit
  • EPSS 0.41%
  • Published 19.03.2020 13:15:12
  • Last modified 21.11.2024 04:27:33

The _dtoa_r function of the newlib libc library, prior to version 3.3.0, performs multiple memory allocations without checking their return value. This could result in NULL pointer dereference.

Exploit
  • EPSS 0.47%
  • Published 18.03.2020 16:15:11
  • Last modified 21.11.2024 04:27:33

The REENT_CHECK macro (see newlib/libc/include/sys/reent.h) as used by REENT_CHECK_TM, REENT_CHECK_MISC, REENT_CHECK_MP and other newlib macros in versions prior to 3.3.0, does not check for memory allocation problems when the DEBUG flag is unset (as...