FS#71554 - [aspell] [Security] arbitrary code execution (CVE-2019-25051)
Attached to Project:
Arch Linux
Opened by Jonas Witschel (diabonas) - Tuesday, 20 July 2021, 08:21 GMT
Last edited by David Runge (dvzrv) - Wednesday, 02 November 2022, 08:36 GMT
Opened by Jonas Witschel (diabonas) - Tuesday, 20 July 2021, 08:21 GMT
Last edited by David Runge (dvzrv) - Wednesday, 02 November 2022, 08:36 GMT
|
Details
Summary
======= The package aspell is vulnerable to arbitrary code execution via CVE-2019-25051. Guidance ======== Applying commit 0718b375425aad8e54e1150313b862e4c6fd324a referenced below fixes the issue. References ========== https://security.archlinux.org/AVG-2178 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/aspell/OSV-2020-521.yaml https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462 https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a |
This task depends upon
Closed by David Runge (dvzrv)
Wednesday, 02 November 2022, 08:36 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed with aspell 0.60.8-3
Wednesday, 02 November 2022, 08:36 GMT
Reason for closing: Fixed
Additional comments about closing: Fixed with aspell 0.60.8-3
The attached diff fixes it.
Please test and give feedback.