First published: Sat May 10 2025(Updated: )
libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from zip_member_read_all) in zip-reader.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU PSPP | <2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-47815 is considered a high-severity vulnerability due to its potential for heap-based buffer overflow exploitation.
To fix CVE-2025-47815, upgrade GNU PSPP to version 2.0.1 or later, which addresses this vulnerability.
The potential impacts of CVE-2025-47815 include application crashes, data corruption, and the possibility of remote code execution.
CVE-2025-47815 affects the libpspp-core.a component in GNU PSPP, specifically in the inflate_read function.
Users and administrators running vulnerable versions of GNU PSPP prior to 2.0.1 are at risk from CVE-2025-47815.