First published: Tue Nov 06 2018(Updated: )
An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt. References: <a href="https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/doublefree">https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/doublefree</a> <a href="https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/heapcorruption">https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/heapcorruption</a>
Affected Software | Affected Version | How to fix |
---|---|---|
gettext |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1647043 is classified as moderate due to the potential for a double free vulnerability.
To fix REDHAT-BUG-1647043, update to the latest version of GNU gettext that addresses the double free issue.
REDHAT-BUG-1647043 affects systems using GNU gettext 0.19.8 and earlier versions.
Yes, there are proofs of concept available that demonstrate the exploitation of the double free vulnerability in GNU gettext 0.19.8.
If an update is not possible, consider mitigating the risk by restricting access to the affected software or disabling its use until a patch can be applied.