We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. Affected by this vulnerability is the function parse_variables_option of the file utilities/pspp-convert.c. The manipulation leads to free of memory not on the heap. An attack has to be approached locally. The exploit has been disclosed to the public and may be used.
In GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb wurde eine kritische Schwachstelle entdeckt. Das betrifft die Funktion parse_variables_option der Datei utilities/pspp-convert.c. Durch Manipulieren mit unbekannten Daten kann eine free of memory not on the heap-Schwachstelle ausgenutzt werden. Der Angriff muss lokal angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
Free of Memory not on the Heap
2025-06-09: | Advisory disclosed |
2025-06-09: | VulDB entry created |
2025-06-09: | VulDB entry last update |
vuldb.com/?id.311671 (VDB-311671 | GNU PSPP pspp-convert.c parse_variables_option free of memory not on the heap)
vuldb.com/?ctiid.311671 (VDB-311671 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.586106 (Submit #586106 | GNU libpspp pspp-convert master in Git Repository[commit:82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb] Denial of Service)
savannah.gnu.org/bugs/index.php?67072
drive.google.com/...VTcc2FzdawYxBJWGujwqy7o/view?usp=sharing
www.gnu.org/
Support options