MGASA-2018-0464

Source
https://advisories.mageia.org/MGASA-2018-0464.html
Import Source
https://advisories.mageia.org/MGASA-2018-0464.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0464
Related
Published
2018-11-21T17:51:03Z
Modified
2018-11-21T17:26:37Z
Summary
Updated gettext packages fix security vulnerability
Details

An issue was discovered in GNU gettext 0.19.8. There is a double free in defaultaddmessage in read-catalog.c, related to an invalid free in pogramparse in po-gram-gen.y, as demonstrated by lt-msgfmt. (CVE-2018-18751)

References
Credits

Affected packages

Mageia:6 / gettext

Package

Name
gettext
Purl
pkg:rpm/mageia/gettext?arch=source&distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.19.8.1-1.1.mga6

Ecosystem specific

{
    "section": "core"
}