
Cloud Vulnerability DB
A community-led vulnerabilities database
The _dtoa_r function of the newlib libc library, prior to version 3.3.0, contains a security vulnerability related to memory allocation handling. The function performs multiple memory allocations without checking their return values, which could lead to potential security issues (NVD, MITRE CVE).
The vulnerability exists in the _dtoa_r function where multiple memory allocations are performed without proper validation of return values. For example, when allocating bigint through d2b function or using Balloc for memory allocation, the code proceeds to use these allocations without verifying if they were successful. This oversight can lead to NULL pointer dereference issues when memory allocation fails (CENSUS Labs).
If successfully exploited, this vulnerability could result in NULL pointer dereference, which may lead to program crashes or potential denial of service conditions. The vulnerability affects all versions of newlib prior to 3.3.0, including its derivatives such as newlib-nano and picolibc (CENSUS Labs).
The recommended mitigation is to update to newlib version 3.3.0 or later, which includes patches addressing this vulnerability. When building the library, it's important to enable the newlib-reent-check-verify 'configure' option for proper protection (CENSUS Labs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."