First published: Mon Sep 05 2022(Updated: )
An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU PSPP | =1.6.2 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39832 is a vulnerability discovered in PSPP 1.6.2 that allows attackers to cause a denial of service or potentially have other unspecified impact.
CVE-2022-39832 has a severity score of 7.8, which is considered high.
PSPP 1.6.2, Fedoraproject Fedora 36, and Fedoraproject Fedora 37 are affected by CVE-2022-39832.
CVE-2022-39832 can be exploited through a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c.
Yes, you can find more information about CVE-2022-39832 at the following links: [Link 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OECANCPD4WSSBJLSC3EE472M5DXRTIS4/), [Link 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQKWIVW5WJ5ZQNNQFRKTRKD7J3LRLUYW/), [Link 3](https://savannah.gnu.org/bugs/index.php?63000).