-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: gettext security and bug fix update
Advisory ID:       RHSA-2020:1138-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:1138
Issue date:        2020-03-31
CVE Names:         CVE-2018-18751 
====================================================================
1. Summary:

An update for gettext is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - noarch
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch

3. Description:

The gettext packages provide a documentation for producing multi-lingual
messages in programs, set of conventions about how programs should be
written, a runtime library, and a directory and file naming organization
for the message catalogs.

Security Fix(es):

* gettext: double free in default_add_message in read-catalog.c
(CVE-2018-18751)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.8 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1647043 - CVE-2018-18751 gettext: double free in default_add_message in read-catalog.c
1788414 - [gettext] preuninstall scripts in TPS tests are failing for 2019:45774

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
gettext-0.19.8.1-3.el7.src.rpm

x86_64:
gettext-0.19.8.1-3.el7.x86_64.rpm
gettext-debuginfo-0.19.8.1-3.el7.i686.rpm
gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm
gettext-libs-0.19.8.1-3.el7.i686.rpm
gettext-libs-0.19.8.1-3.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

noarch:
emacs-gettext-0.19.8.1-3.el7.noarch.rpm
gettext-common-devel-0.19.8.1-3.el7.noarch.rpm

x86_64:
gettext-debuginfo-0.19.8.1-3.el7.i686.rpm
gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm
gettext-devel-0.19.8.1-3.el7.i686.rpm
gettext-devel-0.19.8.1-3.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
gettext-0.19.8.1-3.el7.src.rpm

x86_64:
gettext-0.19.8.1-3.el7.x86_64.rpm
gettext-debuginfo-0.19.8.1-3.el7.i686.rpm
gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm
gettext-libs-0.19.8.1-3.el7.i686.rpm
gettext-libs-0.19.8.1-3.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

noarch:
emacs-gettext-0.19.8.1-3.el7.noarch.rpm
gettext-common-devel-0.19.8.1-3.el7.noarch.rpm

x86_64:
gettext-debuginfo-0.19.8.1-3.el7.i686.rpm
gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm
gettext-devel-0.19.8.1-3.el7.i686.rpm
gettext-devel-0.19.8.1-3.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
gettext-0.19.8.1-3.el7.src.rpm

noarch:
gettext-common-devel-0.19.8.1-3.el7.noarch.rpm

ppc64:
gettext-0.19.8.1-3.el7.ppc64.rpm
gettext-debuginfo-0.19.8.1-3.el7.ppc.rpm
gettext-debuginfo-0.19.8.1-3.el7.ppc64.rpm
gettext-devel-0.19.8.1-3.el7.ppc.rpm
gettext-devel-0.19.8.1-3.el7.ppc64.rpm
gettext-libs-0.19.8.1-3.el7.ppc.rpm
gettext-libs-0.19.8.1-3.el7.ppc64.rpm

ppc64le:
gettext-0.19.8.1-3.el7.ppc64le.rpm
gettext-debuginfo-0.19.8.1-3.el7.ppc64le.rpm
gettext-devel-0.19.8.1-3.el7.ppc64le.rpm
gettext-libs-0.19.8.1-3.el7.ppc64le.rpm

s390x:
gettext-0.19.8.1-3.el7.s390x.rpm
gettext-debuginfo-0.19.8.1-3.el7.s390.rpm
gettext-debuginfo-0.19.8.1-3.el7.s390x.rpm
gettext-devel-0.19.8.1-3.el7.s390.rpm
gettext-devel-0.19.8.1-3.el7.s390x.rpm
gettext-libs-0.19.8.1-3.el7.s390.rpm
gettext-libs-0.19.8.1-3.el7.s390x.rpm

x86_64:
gettext-0.19.8.1-3.el7.x86_64.rpm
gettext-debuginfo-0.19.8.1-3.el7.i686.rpm
gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm
gettext-devel-0.19.8.1-3.el7.i686.rpm
gettext-devel-0.19.8.1-3.el7.x86_64.rpm
gettext-libs-0.19.8.1-3.el7.i686.rpm
gettext-libs-0.19.8.1-3.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch:
emacs-gettext-0.19.8.1-3.el7.noarch.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
gettext-0.19.8.1-3.el7.src.rpm

noarch:
gettext-common-devel-0.19.8.1-3.el7.noarch.rpm

x86_64:
gettext-0.19.8.1-3.el7.x86_64.rpm
gettext-debuginfo-0.19.8.1-3.el7.i686.rpm
gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm
gettext-devel-0.19.8.1-3.el7.i686.rpm
gettext-devel-0.19.8.1-3.el7.x86_64.rpm
gettext-libs-0.19.8.1-3.el7.i686.rpm
gettext-libs-0.19.8.1-3.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

noarch:
emacs-gettext-0.19.8.1-3.el7.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-18751
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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qC3H
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-1138:01 Low: gettext security and bug fix update

An update for gettext is now available for Red Hat Enterprise Linux 7

Summary

The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs.
Security Fix(es):
* gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2018-18751 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index

Package List

Red Hat Enterprise Linux Client (v. 7):
Source: gettext-0.19.8.1-3.el7.src.rpm
x86_64: gettext-0.19.8.1-3.el7.x86_64.rpm gettext-debuginfo-0.19.8.1-3.el7.i686.rpm gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm gettext-libs-0.19.8.1-3.el7.i686.rpm gettext-libs-0.19.8.1-3.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: emacs-gettext-0.19.8.1-3.el7.noarch.rpm gettext-common-devel-0.19.8.1-3.el7.noarch.rpm
x86_64: gettext-debuginfo-0.19.8.1-3.el7.i686.rpm gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm gettext-devel-0.19.8.1-3.el7.i686.rpm gettext-devel-0.19.8.1-3.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: gettext-0.19.8.1-3.el7.src.rpm
x86_64: gettext-0.19.8.1-3.el7.x86_64.rpm gettext-debuginfo-0.19.8.1-3.el7.i686.rpm gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm gettext-libs-0.19.8.1-3.el7.i686.rpm gettext-libs-0.19.8.1-3.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: emacs-gettext-0.19.8.1-3.el7.noarch.rpm gettext-common-devel-0.19.8.1-3.el7.noarch.rpm
x86_64: gettext-debuginfo-0.19.8.1-3.el7.i686.rpm gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm gettext-devel-0.19.8.1-3.el7.i686.rpm gettext-devel-0.19.8.1-3.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: gettext-0.19.8.1-3.el7.src.rpm
noarch: gettext-common-devel-0.19.8.1-3.el7.noarch.rpm
ppc64: gettext-0.19.8.1-3.el7.ppc64.rpm gettext-debuginfo-0.19.8.1-3.el7.ppc.rpm gettext-debuginfo-0.19.8.1-3.el7.ppc64.rpm gettext-devel-0.19.8.1-3.el7.ppc.rpm gettext-devel-0.19.8.1-3.el7.ppc64.rpm gettext-libs-0.19.8.1-3.el7.ppc.rpm gettext-libs-0.19.8.1-3.el7.ppc64.rpm
ppc64le: gettext-0.19.8.1-3.el7.ppc64le.rpm gettext-debuginfo-0.19.8.1-3.el7.ppc64le.rpm gettext-devel-0.19.8.1-3.el7.ppc64le.rpm gettext-libs-0.19.8.1-3.el7.ppc64le.rpm
s390x: gettext-0.19.8.1-3.el7.s390x.rpm gettext-debuginfo-0.19.8.1-3.el7.s390.rpm gettext-debuginfo-0.19.8.1-3.el7.s390x.rpm gettext-devel-0.19.8.1-3.el7.s390.rpm gettext-devel-0.19.8.1-3.el7.s390x.rpm gettext-libs-0.19.8.1-3.el7.s390.rpm gettext-libs-0.19.8.1-3.el7.s390x.rpm
x86_64: gettext-0.19.8.1-3.el7.x86_64.rpm gettext-debuginfo-0.19.8.1-3.el7.i686.rpm gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm gettext-devel-0.19.8.1-3.el7.i686.rpm gettext-devel-0.19.8.1-3.el7.x86_64.rpm gettext-libs-0.19.8.1-3.el7.i686.rpm gettext-libs-0.19.8.1-3.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: emacs-gettext-0.19.8.1-3.el7.noarch.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: gettext-0.19.8.1-3.el7.src.rpm
noarch: gettext-common-devel-0.19.8.1-3.el7.noarch.rpm
x86_64: gettext-0.19.8.1-3.el7.x86_64.rpm gettext-debuginfo-0.19.8.1-3.el7.i686.rpm gettext-debuginfo-0.19.8.1-3.el7.x86_64.rpm gettext-devel-0.19.8.1-3.el7.i686.rpm gettext-devel-0.19.8.1-3.el7.x86_64.rpm gettext-libs-0.19.8.1-3.el7.i686.rpm gettext-libs-0.19.8.1-3.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: emacs-gettext-0.19.8.1-3.el7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:1138-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:1138
Issued Date: : 2020-03-31
CVE Names: CVE-2018-18751

Topic

An update for gettext is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Client (v. 7) - x86_64

Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64

Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64

Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64

Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Server Optional (v. 7) - noarch

Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64

Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch


Bugs Fixed

1647043 - CVE-2018-18751 gettext: double free in default_add_message in read-catalog.c

1788414 - [gettext] preuninstall scripts in TPS tests are failing for 2019:45774


Related News