Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:1660-1

Опубликовано: 18 июн. 2020
Источник: suse-cvrf

Описание

Security update for gnuplot

This update for gnuplot fixes the following issues:

Following security issues were fixed:

  • CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function (bsc#1117463)
  • CVE-2018-19491: Fixed a buffer overlow in the PS_options function (bsc#1117464)
  • CVE-2018-19490: Fixed a heap-based buffer overflow in the df_generate_ascii_array_entry function (bsc#1117465)
  • CVE-2017-9670: Fixed a uninitialized stack variable vulnerability which could lead to a Denial of Service (bsc#1044638)

Список пакетов

SUSE Linux Enterprise Server 12 SP4
gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server 12 SP5
gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP4
gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP5
gnuplot-4.6.5-3.3.74

Описание

An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server 12 SP5:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP5:gnuplot-4.6.5-3.3.74

Ссылки

Описание

An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server 12 SP5:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP5:gnuplot-4.6.5-3.3.74

Ссылки

Описание

An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server 12 SP5:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP5:gnuplot-4.6.5-3.3.74

Ссылки

Описание

An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server 12 SP5:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP4:gnuplot-4.6.5-3.3.74
SUSE Linux Enterprise Server for SAP Applications 12 SP5:gnuplot-4.6.5-3.3.74

Ссылки