You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa gnuplot

Sigurnosni nedostaci programskog paketa gnuplot

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4541-1
September 25, 2020

gnuplot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Gnuplot.

Software Description:
– gnuplot: Command-line driven interactive plotting program

Details:

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
df_generate_ascii_array_entry function. An attacker could possibly use
this issue to cause a heap buffer overflow, resulting in a denial of
service attack or arbitrary code execution. (CVE-2018-19490)

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
PS_options function when the Gnuplot postscript terminal is used as a
backend. An attacker could possibly use this issue to cause a buffer
overflow, resulting in a denial of service attack or arbitrary code
execution. (CVE-2018-19491)

Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars
discovered that Gnuplot did not properly validate string sizes in the
cairotrm_options function when the Gnuplot postscript terminal is used
as a backend. An attacker could possibly use this issue to cause a
buffer overflow, resulting in a denial of service attack or arbitrary
code execution. (CVE-2018-19492)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
gnuplot 4.6.6-3ubuntu0.1
gnuplot-data 4.6.6-3ubuntu0.1
gnuplot-nox 4.6.6-3ubuntu0.1
gnuplot-qt 4.6.6-3ubuntu0.1
gnuplot-tex 4.6.6-3ubuntu0.1
gnuplot-x11 4.6.6-3ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4541-1
CVE-2018-19490, CVE-2018-19491, CVE-2018-19492

Package Information:
https://launchpad.net/ubuntu/+source/gnuplot/4.6.6-3ubuntu0.1

—–BEGIN PGP SIGNATURE—–
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=jcL0
—–END PGP SIGNATURE—–

AutorBruno Varga
Cert idNCERT-REF-2020-09-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa ruby-sanitize

Otkriven je sigurnosni nedostatak u programskom paketu ruby-sanitize za operacijski sustav Ubuntu. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje XSS napada....

Close