USN-5023-1: Aspell vulnerability

Publication date

26 July 2021

Overview

Aspell could be made to execute arbitrary code or cause a crash if it received a specially crafted input.


Packages

  • aspell - GNU Aspell spell-checker

Details

It was discovered that Aspell incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash.

It was discovered that Aspell incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code or
cause a crash.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
21.04 hirsute aspell –  0.60.8-2ubuntu0.1
libaspell15 –  0.60.8-2ubuntu0.1
20.04 focal aspell –  0.60.8-1ubuntu0.1
libaspell15 –  0.60.8-1ubuntu0.1
18.04 bionic aspell –  0.60.7~20110707-4ubuntu0.2
libaspell15 –  0.60.7~20110707-4ubuntu0.2
16.04 xenial aspell –  0.60.7~20110707-3ubuntu0.1+esm1  
libaspell15 –  0.60.7~20110707-3ubuntu0.1+esm1  
14.04 trusty aspell –  0.60.7~20110707-1ubuntu1+esm2  
libaspell15 –  0.60.7~20110707-1ubuntu1+esm2  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›