Bug ID | 1203127 |
---|---|
Summary | VUL-0: CVE-2022-39832: pspp: heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.4 |
Hardware | Other |
URL | https://smash.suse.de/issue/341500/ |
OS | Other |
Status | NEW |
Severity | Minor |
Priority | P5 - None |
Component | Security |
Assignee | blp@cs.stanford.edu |
Reporter | thomas.leroy@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
rh#2124264 An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. Upstream ticket: https://savannah.gnu.org/bugs/index.php?63000 References: https://bugzilla.redhat.com/show_bug.cgi?id=2124264 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39832 https://www.cve.org/CVERecord?id=CVE-2022-39832 https://savannah.gnu.org/bugs/index.php?63000