Security update for gnuplot

Announcement ID: SUSE-SU-2025:01811-1
Release Date: 2025-06-04T09:29:58Z
Rating: moderate
References:
Cross-References:
CVSS scores:
  • CVE-2025-31176 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31176 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31177 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31178 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31178 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31179 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31179 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31180 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31180 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31181 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-31181 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-3359 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-3359 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-3359 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • openSUSE Leap 15.4
  • openSUSE Leap 15.6
  • Server Applications Module 15-SP6
  • SUSE Linux Enterprise Real Time 15 SP6
  • SUSE Linux Enterprise Server 15 SP6
  • SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities can now be installed.

Description:

This update for gnuplot fixes the following issues:

  • CVE-2025-31176: invalid read leads to segmentation fault on plot3d_points (bsc#1240325).
  • CVE-2025-31177: improper bounds check leads to heap-buffer overflow on utf8_copy_one (bsc#1240326).
  • CVE-2025-31178: unvalidated user input leads to segmentation fault on GetAnnotateString (bsc#1240327).
  • CVE-2025-31179: improper verification of time values leads to segmentation fault on xstrftime (bsc#1240328).
  • CVE-2025-31180: unchecked invalid pointer access leads to segmentation fault on CANVAS_text (bsc#1240329).
  • CVE-2025-31181: double fclose() call leads to segmentation fault on X11_graphics (bsc#1240330).
  • CVE-2025-3359: out-of-bounds read when parsing font names may lead to a segmentation fault (bsc#1241684).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.4
    zypper in -t patch SUSE-2025-1811=1
  • openSUSE Leap 15.6
    zypper in -t patch openSUSE-SLE-15.6-2025-1811=1
  • Server Applications Module 15-SP6
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1811=1

Package List:

  • openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
    • gnuplot-debugsource-5.4.3-150400.3.3.1
    • gnuplot-debuginfo-5.4.3-150400.3.3.1
    • gnuplot-5.4.3-150400.3.3.1
  • openSUSE Leap 15.4 (noarch)
    • gnuplot-doc-5.4.3-150400.3.3.1
  • openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
    • gnuplot-debugsource-5.4.3-150400.3.3.1
    • gnuplot-debuginfo-5.4.3-150400.3.3.1
    • gnuplot-5.4.3-150400.3.3.1
  • openSUSE Leap 15.6 (noarch)
    • gnuplot-doc-5.4.3-150400.3.3.1
  • Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    • gnuplot-debugsource-5.4.3-150400.3.3.1
    • gnuplot-debuginfo-5.4.3-150400.3.3.1
    • gnuplot-5.4.3-150400.3.3.1
  • Server Applications Module 15-SP6 (noarch)
    • gnuplot-doc-5.4.3-150400.3.3.1

References: