Mageia 2019-0311: aspell security update
Summary
Updated aspell packages fix security vulnerability:
libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read
in acommon::unescape in common/getdata.cpp via an isolated \ character
(CVE-2019-17544).
References
- https://bugs.mageia.org/show_bug.cgi?id=25640
- https://ubuntu.com/security/notices/USN-4155-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544
Resolution
MGASA-2019-0311 - Updated aspell packages fix security vulnerability
SRPMS
- 7/core/aspell-0.60.8-1.mga7