An update for aspell is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1351 Final 1.0 1.0 2021-09-30 Initial 2021-09-30 2021-09-30 openEuler SA Tool V1.0 2021-09-30 aspell security update An update for aspell is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. GNU Aspell is a spell checker intended to replace Ispell. It can be used as a library and spell checker. Its main feature is that it provides much better suggestions than other inspectors, including Ispell and Microsoft Word. It also has many other technical enhancements to Ispell, such as the use of shared memory to store dictionaries, and intelligent processing of personal dictionaries when multiple Aspell processes are opened at one time. Security Fix(es): objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).(CVE-2019-25051) An update for aspell is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High aspell https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1351 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2019-25051 https://nvd.nist.gov/vuln/detail/CVE-2019-25051 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 aspell-help-0.60.6.1-28.oe1.aarch64.rpm aspell-devel-0.60.6.1-28.oe1.aarch64.rpm aspell-debugsource-0.60.6.1-28.oe1.aarch64.rpm aspell-0.60.6.1-28.oe1.aarch64.rpm aspell-debuginfo-0.60.6.1-28.oe1.aarch64.rpm aspell-debuginfo-0.60.6.1-29.oe1.aarch64.rpm aspell-0.60.6.1-29.oe1.aarch64.rpm aspell-devel-0.60.6.1-29.oe1.aarch64.rpm aspell-debugsource-0.60.6.1-29.oe1.aarch64.rpm aspell-help-0.60.6.1-29.oe1.aarch64.rpm aspell-0.60.6.1-28.oe1.src.rpm aspell-0.60.6.1-29.oe1.src.rpm aspell-0.60.6.1-28.oe1.x86_64.rpm aspell-devel-0.60.6.1-28.oe1.x86_64.rpm aspell-help-0.60.6.1-28.oe1.x86_64.rpm aspell-debuginfo-0.60.6.1-28.oe1.x86_64.rpm aspell-debugsource-0.60.6.1-28.oe1.x86_64.rpm aspell-help-0.60.6.1-29.oe1.x86_64.rpm aspell-0.60.6.1-29.oe1.x86_64.rpm aspell-debugsource-0.60.6.1-29.oe1.x86_64.rpm aspell-devel-0.60.6.1-29.oe1.x86_64.rpm aspell-debuginfo-0.60.6.1-29.oe1.x86_64.rpm objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list). 2021-09-30 CVE-2019-25051 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 High 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H aspell security update 2021-09-30 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1351