vulnerability
SUSE: CVE-2019-20433: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Jan 27, 2020 | Feb 19, 2020 | Feb 4, 2022 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Jan 27, 2020
Added
Feb 19, 2020
Modified
Feb 4, 2022
Description
libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.
Solutions
suse-upgrade-apache2-mod_php53suse-upgrade-apache2-mod_php72suse-upgrade-aspellsuse-upgrade-aspell-develsuse-upgrade-aspell-ispellsuse-upgrade-libaspell15suse-upgrade-libaspell15-32bitsuse-upgrade-libpspell15suse-upgrade-php53suse-upgrade-php53-bcmathsuse-upgrade-php53-bz2suse-upgrade-php53-calendarsuse-upgrade-php53-ctypesuse-upgrade-php53-curlsuse-upgrade-php53-dbasuse-upgrade-php53-domsuse-upgrade-php53-exifsuse-upgrade-php53-fastcgisuse-upgrade-php53-fileinfosuse-upgrade-php53-ftpsuse-upgrade-php53-gdsuse-upgrade-php53-gettextsuse-upgrade-php53-gmpsuse-upgrade-php53-iconvsuse-upgrade-php53-intlsuse-upgrade-php53-jsonsuse-upgrade-php53-ldapsuse-upgrade-php53-mbstringsuse-upgrade-php53-mcryptsuse-upgrade-php53-mysqlsuse-upgrade-php53-odbcsuse-upgrade-php53-opensslsuse-upgrade-php53-pcntlsuse-upgrade-php53-pdosuse-upgrade-php53-pearsuse-upgrade-php53-pgsqlsuse-upgrade-php53-pspellsuse-upgrade-php53-shmopsuse-upgrade-php53-snmpsuse-upgrade-php53-soapsuse-upgrade-php53-suhosinsuse-upgrade-php53-sysvmsgsuse-upgrade-php53-sysvsemsuse-upgrade-php53-sysvshmsuse-upgrade-php53-tokenizersuse-upgrade-php53-wddxsuse-upgrade-php53-xmlreadersuse-upgrade-php53-xmlrpcsuse-upgrade-php53-xmlwritersuse-upgrade-php53-xslsuse-upgrade-php53-zipsuse-upgrade-php53-zlibsuse-upgrade-php72suse-upgrade-php72-bcmathsuse-upgrade-php72-bz2suse-upgrade-php72-calendarsuse-upgrade-php72-ctypesuse-upgrade-php72-curlsuse-upgrade-php72-dbasuse-upgrade-php72-develsuse-upgrade-php72-domsuse-upgrade-php72-enchantsuse-upgrade-php72-exifsuse-upgrade-php72-fastcgisuse-upgrade-php72-fileinfosuse-upgrade-php72-fpmsuse-upgrade-php72-ftpsuse-upgrade-php72-gdsuse-upgrade-php72-gettextsuse-upgrade-php72-gmpsuse-upgrade-php72-iconvsuse-upgrade-php72-imapsuse-upgrade-php72-intlsuse-upgrade-php72-jsonsuse-upgrade-php72-ldapsuse-upgrade-php72-mbstringsuse-upgrade-php72-mysqlsuse-upgrade-php72-odbcsuse-upgrade-php72-opcachesuse-upgrade-php72-opensslsuse-upgrade-php72-pcntlsuse-upgrade-php72-pdosuse-upgrade-php72-pearsuse-upgrade-php72-pear-archive_tarsuse-upgrade-php72-pgsqlsuse-upgrade-php72-pharsuse-upgrade-php72-posixsuse-upgrade-php72-pspellsuse-upgrade-php72-readlinesuse-upgrade-php72-shmopsuse-upgrade-php72-snmpsuse-upgrade-php72-soapsuse-upgrade-php72-socketssuse-upgrade-php72-sodiumsuse-upgrade-php72-sqlitesuse-upgrade-php72-sysvmsgsuse-upgrade-php72-sysvsemsuse-upgrade-php72-sysvshmsuse-upgrade-php72-tidysuse-upgrade-php72-tokenizersuse-upgrade-php72-wddxsuse-upgrade-php72-xmlreadersuse-upgrade-php72-xmlrpcsuse-upgrade-php72-xmlwritersuse-upgrade-php72-xslsuse-upgrade-php72-zipsuse-upgrade-php72-zlib
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.