[USN-4541-1] Gnuplot vulnerabilities

Emilia Torino emilia.torino at canonical.com
Fri Sep 25 17:55:33 UTC 2020


==========================================================================
Ubuntu Security Notice USN-4541-1
September 25, 2020

gnuplot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Gnuplot.

Software Description:
- gnuplot: Command-line driven interactive plotting program

Details:

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
df_generate_ascii_array_entry function. An attacker could possibly use
this issue to cause a heap buffer overflow, resulting in a denial of
service attack or arbitrary code execution. (CVE-2018-19490)

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
PS_options function when the Gnuplot postscript terminal is used as a
backend. An attacker could possibly use this issue to cause a buffer
overflow, resulting in a denial of service attack or arbitrary code
execution. (CVE-2018-19491)

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
cairotrm_options function when the Gnuplot postscript terminal is used
as a backend. An attacker could possibly use this issue to cause a
buffer overflow, resulting in a denial of service attack or arbitrary
code execution. (CVE-2018-19492)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
  gnuplot                         4.6.6-3ubuntu0.1
  gnuplot-data                    4.6.6-3ubuntu0.1
  gnuplot-nox                     4.6.6-3ubuntu0.1
  gnuplot-qt                      4.6.6-3ubuntu0.1
  gnuplot-tex                     4.6.6-3ubuntu0.1
  gnuplot-x11                     4.6.6-3ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
  https://usn.ubuntu.com/4541-1
  CVE-2018-19490, CVE-2018-19491, CVE-2018-19492

Package Information:
  https://launchpad.net/ubuntu/+source/gnuplot/4.6.6-3ubuntu0.1

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20200925/733e3101/attachment.sig>


More information about the ubuntu-security-announce mailing list