File _patchinfo of Package patchinfo.9629
<patchinfo incident="9629">
<issue tracker="bnc" id="1117465">VUL-1: CVE-2018-19490: gnuplot: an attacker can conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry</issue>
<issue tracker="bnc" id="1117464">VUL-1: CVE-2018-19491: gnuplot: an attacker can conduct a buffer overflow with an arbitrary amount of data in the PS_options function</issue>
<issue tracker="bnc" id="1117463">VUL-1: CVE-2018-19492: gnuplot: an attacker can conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function</issue>
<issue tracker="bnc" id="1044638">VUL-1: CVE-2017-9670: gnuplot: in version 5.2.rc1, an uninitialized stack variable vulnerability could lead to a Denial of Service</issue>
<issue tracker="cve" id="2017-9670"/>
<issue tracker="cve" id="2018-19491"/>
<issue tracker="cve" id="2018-19490"/>
<issue tracker="cve" id="2018-19492"/>
<category>security</category>
<rating>moderate</rating>
<packager>WernerFink</packager>
<description>This update for gnuplot fixes the following issues:
Following security issues were fixed:
- CVE-2018-19492: Fixed a buffer overflow in cairotrm_options function (bsc#1117463)
- CVE-2018-19491: Fixed a buffer overlow in the PS_options function (bsc#1117464)
- CVE-2018-19490: Fixed a heap-based buffer overflow in the df_generate_ascii_array_entry function (bsc#1117465)
- CVE-2017-9670: Fixed a uninitialized stack variable vulnerability which could lead to a Denial of Service (bsc#1044638)
</description>
<summary>Security update for gnuplot</summary>
</patchinfo>