Pop-Up Thingie

Too Lazy BBS
  • Home
  • Forum
  • Files
  • Chat
  • Bulletins
  • Register
  • Log in
  • Who's Online

  • Recent Visitors

    • Daniel Garrod
      Mon May 19 15:34:07 2025
      from Cambridge, Uk via Telnet
    • Codefenix
      Mon May 19 10:50:26 2025
      from Canton, Oh via SSH
    • Guest
      Mon May 19 10:33:33 2025
      from V via Telnet
    • Guest
      Sun May 18 01:43:09 2025
      from n via SSH
  • System Info

    Sysop: Amessyroom
    Location: Fayetteville, NC
    Users: 28
    Nodes: 6 (0 / 6)
    Uptime: 62:35:33
    Calls: 425
    Calls today: 3
    Files: 1,025
    Messages: 91,197
    Posted today: 1

  1. Forum
  2. Usenet
  3. LINUX.DEBIAN.BUGS.DIST
  • Bug#1105918: pspp: CVE-2025-48188

    From Salvatore Bonaccorso@21:1/5 to All on Sat May 17 12:00:02 2025
    Source: pspp
    Version: 2.0.1-1
    Severity: important
    Tags: security upstream
    Forwarded: https://savannah.gnu.org/bugs/?67079
    X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

    Hi,

    The following vulnerability was published for pspp.

    CVE-2025-48188[0]:
    | libpspp-core.a in GNU PSPP through 2.0.1 has an incorrect call from
    | fill_buffer (in data/encrypted-file.c) to the Gnulib rijndaelDecrypt
    | function, leading to a heap-based buffer over-read.


    If you fix the vulnerability please also make sure to include the
    CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

    For further information see:

    [0] https://security-tracker.debian.org/tracker/CVE-2025-48188
    https://www.cve.org/CVERecord?id=CVE-2025-48188
    [1] https://savannah.gnu.org/bugs/?67079

    Please adjust the affected versions in the BTS as needed.

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)

© Too Lazy BBS, 2025