MGASA-2019-0311 - Updated aspell packages fix security vulnerability

Publication date: 02 Nov 2019
URL: https://advisories.mageia.org/MGASA-2019-0311.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-17544

Updated aspell packages fix security vulnerability:

libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read
in acommon::unescape in common/getdata.cpp via an isolated \ character
(CVE-2019-17544).

References:
- https://bugs.mageia.org/show_bug.cgi?id=25640
- https://ubuntu.com/security/notices/USN-4155-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544

SRPMS:
- 7/core/aspell-0.60.8-1.mga7

Mageia 2019-0311: aspell security update

Updated aspell packages fix security vulnerability: libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an is...

Summary

Updated aspell packages fix security vulnerability:
libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character (CVE-2019-17544).

References

- https://bugs.mageia.org/show_bug.cgi?id=25640

- https://ubuntu.com/security/notices/USN-4155-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544

Resolution

MGASA-2019-0311 - Updated aspell packages fix security vulnerability

SRPMS

- 7/core/aspell-0.60.8-1.mga7

Severity
Publication date: 02 Nov 2019
URL: https://advisories.mageia.org/MGASA-2019-0311.html
Type: security
CVE: CVE-2019-17544

Related News