First published: Tue Jul 20 2021(Updated: )
objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/aspell | <=0.60.8-2<=0.60.7~20110707-6<=0.60.7~20110707-3 | 0.60.8-3 0.60.7~20110707-6+deb10u1 |
GNU Aspell | =0.60.8 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =34 | |
debian/aspell | 0.60.7~20110707-6+deb10u1 0.60.8-3 0.60.8-4 0.60.8.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-25051 is a vulnerability in GNU Aspell 0.60.8 that allows a heap-based buffer overflow in acommon::ObjStack::dup_top.
CVE-2019-25051 has a severity rating of 7.8 (high).
CVE-2019-25051 affects GNU Aspell 0.60.8 by allowing a heap-based buffer overflow in acommon::ObjStack::dup_top, which can be triggered from acommon::StringMap::add and acommon::Config::lookup_list.
CVE-2019-25051 affects GNU Aspell 0.60.8, Debian Debian Linux 9.0 and 10.0, and Fedora 34.
To fix CVE-2019-25051 in GNU Aspell, you should update to one of the following versions: 0.60.7~20110707-6+deb10u1, 0.60.8-3, 0.60.8-4, 0.60.8-6.