gettext is vulnerable to arbitrary code execution. A double free bug in the function default_add_message
in read-catalog.c
could potentially allow an attacker to execute arbitrary code in the system.
CPE | Name | Operator | Version |
---|---|---|---|
gettext | eq | 0.19.8.1__2.el7 | |
gettext | eq | 0.19.8.1__14.el8 |
lists.opensuse.org/opensuse-security-announce/2020-08/msg00061.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00065.html
lists.opensuse.org/opensuse-security-announce/2020-09/msg00025.html
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
access.redhat.com/errata/RHSA-2019:3643
access.redhat.com/security/updates/classification/#low
github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/doublefree
github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/heapcorruption
usn.ubuntu.com/3815-1/
usn.ubuntu.com/3815-2/