Lucene search

K
gentooGentoo FoundationGLSA-202402-31
HistoryFeb 26, 2024 - 12:00 a.m.

GNU Aspell: Heap Buffer Overflow

2024-02-2600:00:00
Gentoo Foundation
security.gentoo.org
19
gnu aspell
heap buffer overflow
upgrade

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0.001

Percentile

30.7%

Background

GNU Aspell is a popular spell-checker. Dictionaries are available for many languages.

Description

Multiple vulnerabilities have been discovered in GNU Aspell. Please review the CVE identifiers referenced below for details.

Impact

GNU Aspell has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list)

Workaround

There is no known workaround at this time.

Resolution

All aspell users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-text/aspell-0.60.8-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/aspell< 0.60.8-r3UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0.001

Percentile

30.7%