Debian Package Tracker
Register | Log in
Subscribe

pspp

Statistical analysis tool

Choose email to subscribe with

general
  • source: pspp (main)
  • version: 2.0.1-1
  • maintainer: Friedrich Beckmann (DMD)
  • arch: any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.2.0-3
  • oldstable: 1.4.1-1
  • stable: 1.6.2-2
  • testing: 2.0.1-1
  • unstable: 2.0.1-1
versioned links
  • 1.2.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.6.2-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.0.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • pspp
action needed
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2025-5001: A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
  • CVE-2025-47814: libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from spv_read_xml_member) in zip-reader.c.
  • CVE-2025-47815: libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from zip_member_read_all) in zip-reader.c.
Created: 2025-05-11 Last update: 2025-05-22 07:00
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2025-5001: A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
  • CVE-2025-47814: libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from spv_read_xml_member) in zip-reader.c.
  • CVE-2025-47815: libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from zip_member_read_all) in zip-reader.c.
Created: 2025-05-11 Last update: 2025-05-22 07:00
3 security issues in bookworm high

There are 3 open security issues in bookworm.

1 important issue:
  • CVE-2025-5001: A vulnerability was found in GNU PSPP 82fb509fb2fedd33e7ac0c46ca99e108bb3bdffb. It has been declared as problematic. This vulnerability affects the function calloc of the file pspp-convert.c. The manipulation of the argument -l leads to integer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
2 issues left for the package maintainer to handle:
  • CVE-2025-47814: (needs triaging) libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from spv_read_xml_member) in zip-reader.c.
  • CVE-2025-47815: (needs triaging) libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a heap-based buffer overflow in inflate_read (called indirectly from zip_member_read_all) in zip-reader.c.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-05-11 Last update: 2025-05-22 07:00
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2024-03-01 Last update: 2024-03-01 07:36
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-02-27 13:25
testing migrations
  • This package will soon be part of the auto-libxml2 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2024-05-08] pspp 2.0.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-05-03] Accepted pspp 2.0.1-1 (source) into unstable (Friedrich Beckmann)
  • [2024-01-14] pspp 2.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2024-01-14] pspp 2.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2024-01-04] Accepted pspp 2.0.0-3 (source) into unstable (Friedrich Beckmann)
  • [2024-01-04] Accepted pspp 2.0.0-2 (source amd64) into unstable (Friedrich Beckmann)
  • [2024-01-03] Accepted pspp 2.0.0-1 (source amd64) into unstable (Friedrich Beckmann)
  • [2023-02-23] pspp 1.6.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-02-12] Accepted pspp 1.6.2-2 (source) into unstable (Friedrich Beckmann)
  • [2022-07-08] pspp 1.6.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-07-02] Accepted pspp 1.6.2-1 (source) into unstable (Friedrich Beckmann)
  • [2022-06-23] pspp 1.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-17] Accepted pspp 1.6.0-1 (source) into unstable (Friedrich Beckmann)
  • [2022-04-16] pspp 1.5.5-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-16] pspp 1.5.5-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-11] Accepted pspp 1.5.5-1 (source) into unstable (Friedrich Beckmann)
  • [2022-04-10] Accepted pspp 1.5.4-3 (source) into unstable (Friedrich Beckmann)
  • [2022-04-08] Accepted pspp 1.5.4-2 (source) into unstable (Friedrich Beckmann)
  • [2022-04-07] Accepted pspp 1.5.4-1 (source) into unstable (Friedrich Beckmann)
  • [2020-09-11] pspp 1.4.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-09-06] Accepted pspp 1.4.1-1 (source) into unstable (Friedrich Beckmann)
  • [2020-08-24] pspp 1.4.0-3 MIGRATED to testing (Debian testing watch)
  • [2020-08-18] Accepted pspp 1.4.0-3 (source) into unstable (Friedrich Beckmann)
  • [2020-08-17] Accepted pspp 1.4.0-2 (source) into unstable (Friedrich Beckmann)
  • [2020-08-16] Accepted pspp 1.4.0-1 (source amd64) into unstable (Friedrich Beckmann)
  • [2020-08-14] Accepted pspp 1.2.0-6 (source amd64) into unstable (Friedrich Beckmann)
  • [2020-05-31] pspp 1.2.0-5 MIGRATED to testing (Debian testing watch)
  • [2020-05-25] Accepted pspp 1.2.0-5 (source) into unstable (Friedrich Beckmann) (signed by: Dylan Aïssi)
  • [2020-05-22] Accepted pspp 1.2.0-4 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Dylan Aïssi)
  • [2020-05-02] Removed 1.2.0-3 from unstable (Debian FTP Masters)
  • 1
  • 2
bugs [bug history graph]
  • all: 7
  • RC: 0
  • I&N: 7
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 71)
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.0.1-1build2
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing