Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.879883
Category:Fedora Local Security Checks
Title:Fedora: Security Advisory for aspell (FEDORA-2021-69de7c7ca4)
Summary:The remote host is missing an update for the 'aspell'; package(s) announced via the FEDORA-2021-69de7c7ca4 advisory.
Description:Summary:
The remote host is missing an update for the 'aspell'
package(s) announced via the FEDORA-2021-69de7c7ca4 advisory.

Vulnerability Insight:
GNU Aspell is a spell checker designed to eventually replace Ispell. It can
either be used as a library or as an independent spell checker. Its main
feature is that it does a much better job of coming up with possible
suggestions than just about any other spell checker out there for the
English language, including Ispell and Microsoft Word. It also has many
other technical enhancements over Ispell such as using shared memory for
dictionaries and intelligently handling personal dictionaries when more
than one Aspell process is open at once.

Affected Software/OS:
'aspell' package(s) on Fedora 34.

Solution:
Please install the updated package(s).

CVSS Score:
4.6

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-25051
Debian Security Information: DSA-4948 (Google Search)
https://www.debian.org/security/2021/dsa-4948
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H7E4EI7F6TVN7K6XWU6HSANMCOKKEREE/
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462
https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/aspell/OSV-2020-521.yaml
https://lists.debian.org/debian-lts-announce/2021/07/msg00021.html
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.