{"affected":[{"ecosystem_specific":{"binaries":[{"aspell-devel":"0.60.6.1-18.8.2","libpspell15":"0.60.6.1-18.8.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"aspell","purl":"pkg:rpm/suse/aspell&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.60.6.1-18.8.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"aspell":"0.60.6.1-18.8.2","aspell-ispell":"0.60.6.1-18.8.2","libaspell15":"0.60.6.1-18.8.2","libaspell15-32bit":"0.60.6.1-18.8.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"aspell","purl":"pkg:rpm/suse/aspell&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.60.6.1-18.8.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"aspell":"0.60.6.1-18.8.2","aspell-ispell":"0.60.6.1-18.8.2","libaspell15":"0.60.6.1-18.8.2","libaspell15-32bit":"0.60.6.1-18.8.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"aspell","purl":"pkg:rpm/suse/aspell&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.60.6.1-18.8.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for aspell fixes the following security issue:\n\n- CVE-2019-20433: Fixed a buffer over-read when processing strings ending with a single '\\0' byte with ucs-2 and ucs-4 encoding (bsc#1161982).\n","id":"SUSE-SU-2020:2807-1","modified":"2020-09-30T12:36:40Z","published":"2020-09-30T12:36:40Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20202807-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1161982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-20433"}],"related":["CVE-2019-20433"],"summary":"Security update for aspell","upstream":["CVE-2019-20433"]}