An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
{ "binaries": [ { "binary_version": "0.8.5-5build1", "binary_name": "pspp" } ] }
{ "binaries": [ { "binary_version": "1.0.1-1", "binary_name": "pspp" } ] }
{ "binaries": [ { "binary_version": "1.4.1-1build1", "binary_name": "pspp" } ] }
{ "binaries": [ { "binary_version": "2.0.0-3build2", "binary_name": "pspp" } ] }
{ "binaries": [ { "binary_version": "2.0.1-1build1", "binary_name": "pspp" } ] }
{ "binaries": [ { "binary_version": "2.0.1-1build2", "binary_name": "pspp" } ] }