hunspell: CVE-2019-16707

Related Vulnerabilities: CVE-2019-16707  

Debian Bug report logs - #941185
hunspell: CVE-2019-16707

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Thu, 26 Sep 2019 04:39:02 UTC

Severity: normal

Tags: security, upstream

Found in version hunspell/1.7.0-2

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian LibreOffice Maintainers <debian-openoffice@lists.debian.org>:
Bug#941185; Package src:hunspell. (Thu, 26 Sep 2019 04:39:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian LibreOffice Maintainers <debian-openoffice@lists.debian.org>. (Thu, 26 Sep 2019 04:39:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: hunspell: CVE-2019-16707
Date: Thu, 26 Sep 2019 06:37:42 +0200
Source: hunspell
Version: 1.7.0-2
Severity: normal
Tags: security upstream

Hi,

The following vulnerability was published for hunspell. This is not
really a big issue, and negligigle in security tracking context, but
as it seems to have been reported just as crash in [1] it might be
worth reporting it up to upstream.

CVE-2019-16707[0]:
| Hunspell 1.7.0 has an invalid read operation in
| SuggestMgr::leftcommonsubstring in suggestmgr.cxx.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-16707
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707
[1] https://github.com/butterflyhack/hunspell-crash

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
Init: sysvinit (via /sbin/init)



Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Thu Sep 26 16:47:12 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.