Skip to main content

CVE-2025-47229: CWE-617 Reachable Assertion in GNU PSPP

Low
VulnerabilityCVE-2025-47229cvecve-2025-47229cwe-617
Published: Sat May 03 2025 (05/03/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: GNU
Product: PSPP

Description

libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a denial of service (var_set_leave_quiet assertion failure and application exit) via crafted input data, such as data that triggers a call from src/data/dictionary.c code into src/data/variable.c code.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:27:31 UTC

Technical Analysis

CVE-2025-47229 is a vulnerability identified in GNU PSPP, an open-source statistical analysis software often used as a free alternative to proprietary tools like SPSS. The issue resides in the libpspp-core.a library, specifically affecting versions through 2.0.1. The vulnerability is classified as a reachable assertion failure (CWE-617), which occurs when crafted input data triggers an assertion failure in the var_set_leave_quiet function. This function is called via a code path from src/data/dictionary.c into src/data/variable.c. The assertion failure causes the application to exit unexpectedly, resulting in a denial of service (DoS). The CVSS 3.1 base score is 2.9, indicating a low severity level. The attack vector is local (AV:L), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:L) with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability does not allow remote exploitation and requires local access, making it less critical but still a concern for environments where PSPP is used for statistical data processing and availability is important.

Potential Impact

For European organizations, the impact of this vulnerability is primarily a potential denial of service affecting availability of the PSPP application. Since PSPP is used in academic, research, and some governmental statistical analysis contexts, an attacker with local access could cause the software to crash, interrupting data analysis workflows. This could delay research projects, data reporting, or decision-making processes that rely on PSPP. However, the low CVSS score and requirement for local access limit the threat's scope. Confidentiality and integrity of data are not affected, so sensitive data exposure or manipulation is not a concern here. Organizations with automated or batch processing using PSPP might experience disruptions if crafted input data is processed without validation. Overall, the impact is operational disruption rather than data breach or system compromise.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict local access to systems running PSPP to trusted users only, minimizing the risk of malicious input data being introduced. 2) Implement input validation and sanitization on data files before processing them with PSPP to prevent crafted inputs that trigger the assertion failure. 3) Monitor PSPP application logs and system stability to detect unexpected crashes or assertion failures promptly. 4) Isolate PSPP processing environments, especially if used in multi-user or shared systems, to contain potential denial of service impacts. 5) Stay updated with GNU PSPP releases and apply patches as soon as they become available, even though no patch links are currently provided. 6) Consider alternative statistical tools or additional redundancy in workflows to maintain availability during potential PSPP downtime. These steps go beyond generic advice by focusing on access control, input validation, monitoring, and operational continuity specific to PSPP usage contexts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-03T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc4f0

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:27:31 AM

Last updated: 8/13/2025, 11:08:06 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats