Bug 1984066 (CVE-2019-25051) - CVE-2019-25051 aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top
Summary: CVE-2019-25051 aspell: Heap-buffer-overflow in acommon::ObjStack::dup_top
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-25051
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1984067 1988497
Blocks: 1984069
TreeView+ depends on / blocked
 
Reported: 2021-07-20 14:47 UTC by Michael Kaplan
Modified: 2022-05-11 02:16 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-05-11 02:16:27 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:1808 0 None None None 2022-05-10 13:33:20 UTC

Description Michael Kaplan 2021-07-20 14:47:35 UTC
objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).

References:

https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/aspell/OSV-2020-521.yaml

Comment 1 Michael Kaplan 2021-07-20 14:48:54 UTC
Created aspell tracking bugs for this issue:

Affects: fedora-all [bug 1984067]

Comment 3 Garrett Tucker 2021-07-30 20:27:36 UTC
After analysis, the flaw is caused by a lack of checking that an allocation size will fit within a chunk. It is trivial to cause the heap to overflow, and a significant amount is able to be written. This could potentially lead an attacker to execute arbitrary code on the affected system leading to complete exploitation of the system. The upstream patch is https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a and can either be applied manually or by updating to the latest version of aspell

Comment 4 errata-xmlrpc 2022-05-10 13:33:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1808 https://access.redhat.com/errata/RHSA-2022:1808

Comment 5 Product Security DevOps Team 2022-05-11 02:16:25 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-25051


Note You need to log in before you can comment on or make changes to this bug.