aspell 0.60.7~20110707-6+deb10u1 source package in Debian
Changelog
aspell (0.60.7~20110707-6+deb10u1) buster-security; urgency=high * Non-maintainer upload by the LTS Team. * CVE-2019-17544 It was discovered that Aspell incorrectly handled certain inputs which leads to a stack-based buffer over-read. An attacker could potentially access sensitive information. [ Agustin Martin Domingo ] * CVE-2019-25051 (Closes: #991307) objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow -- Thorsten Alteholz <email address hidden> Sat, 24 Jul 2021 19:03:02 +0200
Upload details
- Uploaded by:
- Agustin Martin Domingo
- Uploaded to:
- Buster
- Original maintainer:
- Agustin Martin Domingo
- Architectures:
- any all
- Section:
- text
- Urgency:
- Very Urgent
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Buster | release | main | text |
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
aspell_0.60.7~20110707-6+deb10u1.dsc | 2.3 KiB | b5acf95913c5c273d8ae56d05d41a380666f2db62a30a8abb308c25ae7bccec6 |
aspell_0.60.7~20110707.orig.tar.gz | 1.8 MiB | 71a41224e224af08a0051a9048fc0b4a912acee997d4870cfd68bd7327c45b61 |
aspell_0.60.7~20110707-6+deb10u1.debian.tar.xz | 26.9 KiB | 5b607c76d957398ec9b7b5bcd522cc327c5521ac7df525319d14c993c73a859c |
No changes file available.