CVE-2019-20433

NameCVE-2019-20433
Descriptionlibaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs935128

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
aspell (PTS)stretch0.60.7~20110707-3vulnerable
stretch (security)0.60.7~20110707-3+deb9u1vulnerable
buster0.60.7~20110707-6vulnerable
buster (security)0.60.7~20110707-6+deb10u1vulnerable
bookworm, bullseye, sid0.60.8-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aspellsource(unstable)0.60.7-3935128

Notes

[buster] - aspell <no-dsa> (Minor issue)
[stretch] - aspell <no-dsa> (Minor issue)
[jessie] - aspell <ignored> (Minor issue)
http://aspell.net/buffer-overread-ucs.txt
Fixed by: https://github.com/GNUAspell/aspell/commit/de29341638833ba7717bd6b5e6850998454b044b
Recommended additionally: https://github.com/GNUAspell/aspell/commit/cefd447e5528b08bb0cd6656bc52b4255692cefc

Search for package or bug name: Reporting problems