aspell 0.60.7~20110707-6+deb10u1 source package in Debian

Changelog

aspell (0.60.7~20110707-6+deb10u1) buster-security; urgency=high

  * Non-maintainer upload by the LTS Team.
  * CVE-2019-17544
    It was discovered that Aspell incorrectly handled certain inputs which
    leads to a stack-based buffer over-read.
    An attacker could potentially access sensitive information.

  [ Agustin Martin Domingo ]
  * CVE-2019-25051 (Closes: #991307)
    objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow

 -- Thorsten Alteholz <email address hidden>  Sat, 24 Jul 2021 19:03:02 +0200

Upload details

Uploaded by:
Agustin Martin Domingo
Uploaded to:
Buster
Original maintainer:
Agustin Martin Domingo
Architectures:
any all
Section:
text
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section
Buster release main text

Builds

Downloads

File Size SHA-256 Checksum
aspell_0.60.7~20110707-6+deb10u1.dsc 2.3 KiB b5acf95913c5c273d8ae56d05d41a380666f2db62a30a8abb308c25ae7bccec6
aspell_0.60.7~20110707.orig.tar.gz 1.8 MiB 71a41224e224af08a0051a9048fc0b4a912acee997d4870cfd68bd7327c45b61
aspell_0.60.7~20110707-6+deb10u1.debian.tar.xz 26.9 KiB 5b607c76d957398ec9b7b5bcd522cc327c5521ac7df525319d14c993c73a859c

No changes file available.

Binary packages built by this source