Debian 10228 Published by

A Gnuplot security update has been released for Ubuntu Linux 16.04 LTS.



USN-4541-1: Gnuplot vulnerabilities


==========================================================================
Ubuntu Security Notice USN-4541-1
September 25, 2020

gnuplot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Gnuplot.

Software Description:
- gnuplot: Command-line driven interactive plotting program

Details:

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
df_generate_ascii_array_entry function. An attacker could possibly use
this issue to cause a heap buffer overflow, resulting in a denial of
service attack or arbitrary code execution. (CVE-2018-19490)

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
PS_options function when the Gnuplot postscript terminal is used as a
backend. An attacker could possibly use this issue to cause a buffer
overflow, resulting in a denial of service attack or arbitrary code
execution. (CVE-2018-19491)

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
cairotrm_options function when the Gnuplot postscript terminal is used
as a backend. An attacker could possibly use this issue to cause a
buffer overflow, resulting in a denial of service attack or arbitrary
code execution. (CVE-2018-19492)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
gnuplot 4.6.6-3ubuntu0.1
gnuplot-data 4.6.6-3ubuntu0.1
gnuplot-nox 4.6.6-3ubuntu0.1
gnuplot-qt 4.6.6-3ubuntu0.1
gnuplot-tex 4.6.6-3ubuntu0.1
gnuplot-x11 4.6.6-3ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  https://usn.ubuntu.com/4541-1
CVE-2018-19490, CVE-2018-19491, CVE-2018-19492

Package Information:
  https://launchpad.net/ubuntu/+source/gnuplot/4.6.6-3ubuntu0.1

--2xPPZXaNzv9w3sMkKaoNL9l15UT0XUMZr--

--VohR0OsBInlyaC0DPctcpv5pZr24aVyfS