Debian Package Tracker
Register | Log in
Subscribe

pspp

Statistical analysis tool

Choose email to subscribe with

general
  • source: pspp (main)
  • version: 1.6.2-2
  • maintainer: Friedrich Beckmann (DMD)
  • arch: any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1.2.0-3
  • stable: 1.4.1-1
  • testing: 1.6.2-2
  • unstable: 1.6.2-2
versioned links
  • 1.2.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.6.2-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • pspp
action needed
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-04-14 Last update: 2023-05-17 08:01
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-07-30 Last update: 2023-02-03 01:40
2 low-priority security issues in bullseye low

There are 2 open security issues in bullseye.

2 issues left for the package maintainer to handle:
  • CVE-2022-39831: (needs triaging) An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact. This issue is different from CVE-2018-20230.
  • CVE-2022-39832: (needs triaging) An issue was discovered in PSPP 1.6.2. There is a heap-based buffer overflow at the function read_string in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-09-05 Last update: 2023-03-27 11:06
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 1.6.2-2 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-26 15:54
news
[rss feed]
  • [2023-02-23] pspp 1.6.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-02-12] Accepted pspp 1.6.2-2 (source) into unstable (Friedrich Beckmann)
  • [2022-07-08] pspp 1.6.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-02] Accepted pspp 1.6.2-1 (source) into unstable (Friedrich Beckmann)
  • [2022-06-23] pspp 1.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-17] Accepted pspp 1.6.0-1 (source) into unstable (Friedrich Beckmann)
  • [2022-04-16] pspp 1.5.5-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-16] pspp 1.5.5-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-11] Accepted pspp 1.5.5-1 (source) into unstable (Friedrich Beckmann)
  • [2022-04-10] Accepted pspp 1.5.4-3 (source) into unstable (Friedrich Beckmann)
  • [2022-04-08] Accepted pspp 1.5.4-2 (source) into unstable (Friedrich Beckmann)
  • [2022-04-07] Accepted pspp 1.5.4-1 (source) into unstable (Friedrich Beckmann)
  • [2020-09-11] pspp 1.4.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-09-06] Accepted pspp 1.4.1-1 (source) into unstable (Friedrich Beckmann)
  • [2020-08-24] pspp 1.4.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-08-18] Accepted pspp 1.4.0-3 (source) into unstable (Friedrich Beckmann)
  • [2020-08-17] Accepted pspp 1.4.0-2 (source) into unstable (Friedrich Beckmann)
  • [2020-08-16] Accepted pspp 1.4.0-1 (source amd64) into unstable (Friedrich Beckmann)
  • [2020-08-14] Accepted pspp 1.2.0-6 (source amd64) into unstable (Friedrich Beckmann)
  • [2020-05-31] pspp 1.2.0-5 MIGRATED to testing (Debian testing watch)
  • [2020-05-25] Accepted pspp 1.2.0-5 (source) into unstable (Friedrich Beckmann) (signed by: Dylan Aïssi)
  • [2020-05-22] Accepted pspp 1.2.0-4 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Dylan Aïssi)
  • [2020-05-02] Removed 1.2.0-3 from unstable (Debian FTP Masters)
  • [2019-08-24] pspp REMOVED from testing (Debian testing watch)
  • [2019-04-28] pspp 1.2.0-3 MIGRATED to testing (Debian testing watch)
  • [2019-04-23] Accepted pspp 1.2.0-3 (source amd64) into unstable (Andreas Tille)
  • [2018-12-17] pspp 1.2.0-2 MIGRATED to testing (Debian testing watch)
  • [2018-11-26] Accepted pspp 1.2.0-2 (source i386) into unstable (Friedrich Beckmann) (signed by: Ben Pfaff)
  • [2018-11-25] Accepted pspp 1.2.0-1 (source i386) into unstable (Friedrich Beckmann) (signed by: Ben Pfaff)
  • [2018-11-14] pspp REMOVED from testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 73)
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.6.2-2
  • 2 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing