Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2023:3091-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2023/suse-su-20233091-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2023:3091-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2023:3091-1
Related
CVE-2020-25969
Published
2023-08-01T08:58:39Z
Modified
2025-05-08T17:29:03.119021Z
Upstream
CVE-2020-25969
Summary
Security update for gnuplot
Details
This update for gnuplot fixes the following issues:
CVE-2020-25969: Fixed buffer overflow via the function plotrequest() (bsc#1213068).
CVE-2020-25559: Fixed double free when executing print
set
output (bsc#1176689).
References
https://www.suse.com/support/update/announcement/2023/suse-su-20233091-1/
https://bugzilla.suse.com/1176689
https://bugzilla.suse.com/1213068
https://www.suse.com/security/cve/CVE-2020-25969
Affected packages
SUSE:Linux Enterprise Server 12 SP5
/
gnuplot
Package
Name
gnuplot
Purl
pkg:rpm/suse/gnuplot&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.6.5-3.6.1
Ecosystem specific
{ "binaries": [ { "gnuplot": "4.6.5-3.6.1" } ] }
SUSE:Linux Enterprise Server for SAP Applications 12 SP5
/
gnuplot
Package
Name
gnuplot
Purl
pkg:rpm/suse/gnuplot&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
4.6.5-3.6.1
Ecosystem specific
{ "binaries": [ { "gnuplot": "4.6.5-3.6.1" } ] }
SUSE-SU-2023:3091-1 - OSV