-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: hunspell security update
Advisory ID:       RHSA-2020:3971-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:3971
Issue date:        2020-09-29
CVE Names:         CVE-2019-16707 
====================================================================
1. Summary:

An update for hunspell is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

Hunspell is a spell checker and morphological analyzer library and program
designed for languages with rich morphology and complex word compounding or
character encoding. 

Security Fix(es):

* hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in
suggestmgr.cxx (CVE-2019-16707)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.9 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1771026 - CVE-2019-16707 hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
hunspell-1.3.2-16.el7.src.rpm

x86_64:
hunspell-1.3.2-16.el7.i686.rpm
hunspell-1.3.2-16.el7.x86_64.rpm
hunspell-debuginfo-1.3.2-16.el7.i686.rpm
hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64:
hunspell-debuginfo-1.3.2-16.el7.i686.rpm
hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm
hunspell-devel-1.3.2-16.el7.i686.rpm
hunspell-devel-1.3.2-16.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
hunspell-1.3.2-16.el7.src.rpm

x86_64:
hunspell-1.3.2-16.el7.i686.rpm
hunspell-1.3.2-16.el7.x86_64.rpm
hunspell-debuginfo-1.3.2-16.el7.i686.rpm
hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64:
hunspell-debuginfo-1.3.2-16.el7.i686.rpm
hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm
hunspell-devel-1.3.2-16.el7.i686.rpm
hunspell-devel-1.3.2-16.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
hunspell-1.3.2-16.el7.src.rpm

ppc64:
hunspell-1.3.2-16.el7.ppc.rpm
hunspell-1.3.2-16.el7.ppc64.rpm
hunspell-debuginfo-1.3.2-16.el7.ppc.rpm
hunspell-debuginfo-1.3.2-16.el7.ppc64.rpm
hunspell-devel-1.3.2-16.el7.ppc.rpm
hunspell-devel-1.3.2-16.el7.ppc64.rpm

ppc64le:
hunspell-1.3.2-16.el7.ppc64le.rpm
hunspell-debuginfo-1.3.2-16.el7.ppc64le.rpm
hunspell-devel-1.3.2-16.el7.ppc64le.rpm

s390x:
hunspell-1.3.2-16.el7.s390.rpm
hunspell-1.3.2-16.el7.s390x.rpm
hunspell-debuginfo-1.3.2-16.el7.s390.rpm
hunspell-debuginfo-1.3.2-16.el7.s390x.rpm
hunspell-devel-1.3.2-16.el7.s390.rpm
hunspell-devel-1.3.2-16.el7.s390x.rpm

x86_64:
hunspell-1.3.2-16.el7.i686.rpm
hunspell-1.3.2-16.el7.x86_64.rpm
hunspell-debuginfo-1.3.2-16.el7.i686.rpm
hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm
hunspell-devel-1.3.2-16.el7.i686.rpm
hunspell-devel-1.3.2-16.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
hunspell-1.3.2-16.el7.src.rpm

x86_64:
hunspell-1.3.2-16.el7.i686.rpm
hunspell-1.3.2-16.el7.x86_64.rpm
hunspell-debuginfo-1.3.2-16.el7.i686.rpm
hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm
hunspell-devel-1.3.2-16.el7.i686.rpm
hunspell-devel-1.3.2-16.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-16707
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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U244
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-3971:01 Low: hunspell security update

An update for hunspell is now available for Red Hat Enterprise Linux 7

Summary

Hunspell is a spell checker and morphological analyzer library and program designed for languages with rich morphology and complex word compounding or character encoding.
Security Fix(es):
* hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx (CVE-2019-16707)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-16707 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index

Package List

Red Hat Enterprise Linux Client (v. 7):
Source: hunspell-1.3.2-16.el7.src.rpm
x86_64: hunspell-1.3.2-16.el7.i686.rpm hunspell-1.3.2-16.el7.x86_64.rpm hunspell-debuginfo-1.3.2-16.el7.i686.rpm hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: hunspell-debuginfo-1.3.2-16.el7.i686.rpm hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm hunspell-devel-1.3.2-16.el7.i686.rpm hunspell-devel-1.3.2-16.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: hunspell-1.3.2-16.el7.src.rpm
x86_64: hunspell-1.3.2-16.el7.i686.rpm hunspell-1.3.2-16.el7.x86_64.rpm hunspell-debuginfo-1.3.2-16.el7.i686.rpm hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: hunspell-debuginfo-1.3.2-16.el7.i686.rpm hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm hunspell-devel-1.3.2-16.el7.i686.rpm hunspell-devel-1.3.2-16.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: hunspell-1.3.2-16.el7.src.rpm
ppc64: hunspell-1.3.2-16.el7.ppc.rpm hunspell-1.3.2-16.el7.ppc64.rpm hunspell-debuginfo-1.3.2-16.el7.ppc.rpm hunspell-debuginfo-1.3.2-16.el7.ppc64.rpm hunspell-devel-1.3.2-16.el7.ppc.rpm hunspell-devel-1.3.2-16.el7.ppc64.rpm
ppc64le: hunspell-1.3.2-16.el7.ppc64le.rpm hunspell-debuginfo-1.3.2-16.el7.ppc64le.rpm hunspell-devel-1.3.2-16.el7.ppc64le.rpm
s390x: hunspell-1.3.2-16.el7.s390.rpm hunspell-1.3.2-16.el7.s390x.rpm hunspell-debuginfo-1.3.2-16.el7.s390.rpm hunspell-debuginfo-1.3.2-16.el7.s390x.rpm hunspell-devel-1.3.2-16.el7.s390.rpm hunspell-devel-1.3.2-16.el7.s390x.rpm
x86_64: hunspell-1.3.2-16.el7.i686.rpm hunspell-1.3.2-16.el7.x86_64.rpm hunspell-debuginfo-1.3.2-16.el7.i686.rpm hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm hunspell-devel-1.3.2-16.el7.i686.rpm hunspell-devel-1.3.2-16.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: hunspell-1.3.2-16.el7.src.rpm
x86_64: hunspell-1.3.2-16.el7.i686.rpm hunspell-1.3.2-16.el7.x86_64.rpm hunspell-debuginfo-1.3.2-16.el7.i686.rpm hunspell-debuginfo-1.3.2-16.el7.x86_64.rpm hunspell-devel-1.3.2-16.el7.i686.rpm hunspell-devel-1.3.2-16.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:3971-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3971
Issued Date: : 2020-09-29
CVE Names: CVE-2019-16707

Topic

An update for hunspell is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Client (v. 7) - x86_64

Red Hat Enterprise Linux Client Optional (v. 7) - x86_64

Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64

Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64

Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Workstation (v. 7) - x86_64


Bugs Fixed

1771026 - CVE-2019-16707 hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx


Related News