We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical has been found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Affected is the function parse_variables_option of the file utilities/pspp-convert.c. The manipulation leads to out-of-bounds write. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used.
Es wurde eine kritische Schwachstelle in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb entdeckt. Es betrifft die Funktion parse_variables_option der Datei utilities/pspp-convert.c. Durch das Manipulieren mit unbekannten Daten kann eine out-of-bounds write-Schwachstelle ausgenutzt werden. Der Angriff hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-06-09: | Advisory disclosed |
2025-06-09: | VulDB entry created |
2025-06-09: | VulDB entry last update |
vuldb.com/?id.311670 (VDB-311670 | GNU PSPP pspp-convert.c parse_variables_option out-of-bounds write)
vuldb.com/?ctiid.311670 (VDB-311670 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.586105 (Submit #586105 | GNU libpspp pspp-convert master in Git Repository [commit:82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb] Denial of Service)
savannah.gnu.org/bugs/index.php?67071
drive.google.com/...5YUWFLu1V2juDGWQgbJFAtX/view?usp=sharing
www.gnu.org/
Support options