Aspell GNU Aspell

Do you want an email whenever new security vulnerabilities are reported in GNU Aspell?

By the Year

In 2024 there have been 0 vulnerabilities in GNU Aspell . Aspell did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 7.80
2020 1 9.10
2019 1 9.10
2018 0 0.00

It may take a day or so for new Aspell vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent GNU Aspell Security Vulnerabilities

objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called

CVE-2019-25051 7.8 - High - July 20, 2021

objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).

Memory Corruption

libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte

CVE-2019-20433 9.1 - Critical - January 27, 2020

libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.

Out-of-bounds Read

libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp

CVE-2019-17544 9.1 - Critical - October 14, 2019

libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.

Out-of-bounds Read

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Canonical Ubuntu Linux or by GNU? Click the Watch button to subscribe.

GNU
Vendor

GNU Aspell
Product

subscribe