user/aspell: multiple vulnerabilities
We are at 0.60.8
as of the 1.0-BETA5
tag. Latest available is 0.60.8.1
:
Name | Description |
---|---|
CVE-2019-25051 | objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list). |
CVE-2019-20433 | libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable. |
CVE-2019-17544 | libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character. |
The release notes look like there's a typo (0.68.8
vs. 0.60.8
):
From: Kevin Atkinson
Date: Tue, 19 Dec 2023
Subject: Aspell 0.60.8.1 Now Available
GNU Aspell 0.60.8.1 is now available at:
ftp://ftp.gnu.org/gnu/aspell/aspell-0.60.8.1.tar.gz
Changes from 0.68.8 to 0.68.8.1:
* Fix memory leak in suggestion code introduced in 0.60.8.
* Various documentation fixes.
* Fix various warnings when compiling with -Wall.
* Fix two buffer overflows found by Google’s OSS-Fuzz.
* Other minor updates.