USN-4155-1: Aspell vulnerability

Publication date

15 October 2019

Overview

Aspell could be made to expose sensitive information if it received a specially crafted input.


Packages

  • aspell - GNU Aspell spell-checker

Details

It was discovered that Aspell incorrectly handled certain inputs.
An attacker could potentially access sensitive information.

It was discovered that Aspell incorrectly handled certain inputs.
An attacker could potentially access sensitive information.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
19.04 disco aspell –  0.60.7~20110707-6ubuntu0.1
libaspell15 –  0.60.7~20110707-6ubuntu0.1
18.04 bionic aspell –  0.60.7~20110707-4ubuntu0.1
libaspell15 –  0.60.7~20110707-4ubuntu0.1
16.04 xenial aspell –  0.60.7~20110707-3ubuntu0.1
libaspell15 –  0.60.7~20110707-3ubuntu0.1
14.04 trusty aspell –  0.60.7~20110707-1ubuntu1+esm1  
libaspell15 –  0.60.7~20110707-1ubuntu1+esm1  
12.04 precise aspell –  0.60.7~20110707-1ubuntu0.1
libaspell15 –  0.60.7~20110707-1ubuntu0.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›