Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
DEBIAN-CVE-2025-31177
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2025-31177
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-31177.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-31177
Upstream
CVE-2025-31177
Published
2025-05-07T21:16:03Z
Modified
2025-09-18T05:18:43Z
Summary
[none]
Details
gnuplot is affected by a heap buffer overflow at function utf8
copy
one.
References
https://security-tracker.debian.org/tracker/CVE-2025-31177
Affected packages
Debian:11
/
gnuplot
Package
Name
gnuplot
Purl
pkg:deb/debian/gnuplot?arch=source
Affected ranges
Ecosystem specific
{ "urgency": "unimportant" }
Debian:12
/
gnuplot
Package
Name
gnuplot
Purl
pkg:deb/debian/gnuplot?arch=source
Affected ranges
Ecosystem specific
{ "urgency": "unimportant" }
Debian:13
/
gnuplot
Package
Name
gnuplot
Purl
pkg:deb/debian/gnuplot?arch=source
Affected ranges
Ecosystem specific
{ "urgency": "unimportant" }
Debian:14
/
gnuplot
Package
Name
gnuplot
Purl
pkg:deb/debian/gnuplot?arch=source
Affected ranges
Ecosystem specific
{ "urgency": "unimportant" }
DEBIAN-CVE-2025-31177 - OSV