Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#71554 - [aspell] [Security] arbitrary code execution (CVE-2019-25051)
Attached to Project:
Arch Linux
Opened by Jonas Witschel (diabonas) - Tuesday, 20 July 2021, 08:21 GMT
Last edited by David Runge (dvzrv) - Wednesday, 02 November 2022, 08:36 GMT
Opened by Jonas Witschel (diabonas) - Tuesday, 20 July 2021, 08:21 GMT
Last edited by David Runge (dvzrv) - Wednesday, 02 November 2022, 08:36 GMT
|
DetailsSummary
======= The package aspell is vulnerable to arbitrary code execution via CVE-2019-25051. Guidance ======== Applying commit 0718b375425aad8e54e1150313b862e4c6fd324a referenced below fixes the issue. References ========== https://security.archlinux.org/AVG-2178 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/aspell/OSV-2020-521.yaml https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462 https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a |
This task depends upon
Closed by David Runge (dvzrv)
Wednesday, 02 November 2022, 08:36 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed with aspell 0.60.8-3
Wednesday, 02 November 2022, 08:36 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed with aspell 0.60.8-3
The attached diff fixes it.
Please test and give feedback.