GNU PSPP 1.6.2

CPE Details

GNU PSPP 1.6.2
1.6.2
2022-09-08
11h56 +00:00
2022-09-08
13h26 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gnu:pspp:1.6.2:*:*:*:*:*:*:*

Informations

Vendor

gnu

Product

pspp

Version

1.6.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-47814 2025-05-10 00h00 +00:00 libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from spv_read_xml_member) in zip-reader.c.
9.8
Critical
CVE-2025-47815 2025-05-10 00h00 +00:00 libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from zip_member_read_all) in zip-reader.c.
9.8
Critical
CVE-2025-47816 2025-05-10 00h00 +00:00 libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause an spvxml-helpers.c spvxml_parse_attributes out-of-bounds read, related to extra content at the end of a document.
9.1
Critical
CVE-2022-39831 2022-09-05 02h12 +00:00 An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. This issue is different from CVE-2018-20230.
7.8
High
CVE-2022-39832 2022-09-05 02h12 +00:00 An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
7.8
High