[USN-4541-1] Gnuplot vulnerabilities
Emilia Torino
emilia.torino at canonical.com
Fri Sep 25 17:55:33 UTC 2020
==========================================================================
Ubuntu Security Notice USN-4541-1
September 25, 2020
gnuplot vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Gnuplot.
Software Description:
- gnuplot: Command-line driven interactive plotting program
Details:
Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
df_generate_ascii_array_entry function. An attacker could possibly use
this issue to cause a heap buffer overflow, resulting in a denial of
service attack or arbitrary code execution. (CVE-2018-19490)
Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
PS_options function when the Gnuplot postscript terminal is used as a
backend. An attacker could possibly use this issue to cause a buffer
overflow, resulting in a denial of service attack or arbitrary code
execution. (CVE-2018-19491)
Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
cairotrm_options function when the Gnuplot postscript terminal is used
as a backend. An attacker could possibly use this issue to cause a
buffer overflow, resulting in a denial of service attack or arbitrary
code execution. (CVE-2018-19492)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
gnuplot 4.6.6-3ubuntu0.1
gnuplot-data 4.6.6-3ubuntu0.1
gnuplot-nox 4.6.6-3ubuntu0.1
gnuplot-qt 4.6.6-3ubuntu0.1
gnuplot-tex 4.6.6-3ubuntu0.1
gnuplot-x11 4.6.6-3ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4541-1
CVE-2018-19490, CVE-2018-19491, CVE-2018-19492
Package Information:
https://launchpad.net/ubuntu/+source/gnuplot/4.6.6-3ubuntu0.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20200925/733e3101/attachment.sig>
More information about the ubuntu-security-announce
mailing list