Bug 1882320 (CVE-2020-25559) - CVE-2020-25559 gnuplot: double free when executing print_set_output may lead to arbitrary code execution
Summary: CVE-2020-25559 gnuplot: double free when executing print_set_output may lead ...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-25559
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1882321 1882851 1882852
Blocks: 1882326
TreeView+ depends on / blocked
 
Reported: 2020-09-24 10:32 UTC by Marian Rehak
Modified: 2021-11-02 17:48 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in gnuplot. A double free memory issue when executing print_set_output may result in context-dependent arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Clone Of:
Environment:
Last Closed: 2021-11-02 17:48:00 UTC
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2020-09-24 10:32:21 UTC
gnuplot 5.5 is affected by double free when executing print_set_output. This may result in context-dependent arbitrary code execution.

Reference:

https://sourceforge.net/p/gnuplot/bugs/2312/

Comment 1 Marian Rehak 2020-09-24 10:32:52 UTC
Created gnuplot tracking bugs for this issue:

Affects: fedora-all [bug 1882321]

Comment 4 Todd Cullum 2020-09-25 21:30:40 UTC
I've set RHEL7 severity to low as it would not reproduce but seems to be possible in the source code.


Note You need to log in before you can comment on or make changes to this bug.