Your message dated Sat, 01 Jul 2017 03:32:08 +0000
with message-id <e1dr98i-00039m...@fasolo.debian.org>
and subject line Bug#864901: fixed in gnuplot 5.0.5+dfsg1-6+deb9u1
has caused the Debian Bug report #864901,
regarding gnuplot: CVE-2017-9670: uninitialized stack variable vulnerability 
could lead to a Denial of Service
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
864901: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864901
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gnuplot
Version: 5.0.5+dfsg1-6
Severity: important
Tags: patch security upstream
Forwarded: https://sourceforge.net/p/gnuplot/bugs/1933/

Hi,

the following vulnerability was published for gnuplot.

CVE-2017-9670[0]:
| An uninitialized stack variable vulnerability in load_tic_series() in
| set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service
| (Segmentation fault and Memory Corruption) or possibly have unspecified
| other impact when a victim opens a specially crafted file.

AFAICT, it has been introduced with [2], as per [3], and fixed in [4].
Please double check and adjust the affected versions in the BTS as
needed if I got it actually wrong and older versions are affected.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-9670
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9670
[1] https://sourceforge.net/p/gnuplot/bugs/1933/
[2] 
https://github.com/gnuplot/gnuplot/commit/cd4b777389379598740fc02decff772b0e7bcbd6
[3] https://bugzilla.novell.com/show_bug.cgi?id=1044638#c5
[4] 
https://github.com/gnuplot/gnuplot/commit/4e39b1d7b274c7d4a69cbaba85ff321264f4457e

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: gnuplot
Source-Version: 5.0.5+dfsg1-6+deb9u1

We believe that the bug you reported is fixed in the latest version of
gnuplot, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 864...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anton Gladky <gl...@debian.org> (supplier of updated gnuplot package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 16 Jun 2017 22:35:29 +0200
Source: gnuplot
Binary: gnuplot gnuplot-doc gnuplot-nox gnuplot-qt gnuplot-x11 gnuplot-data 
gnuplot5 gnuplot5-nox gnuplot5-x11 gnuplot5-qt
Architecture: source
Version: 5.0.5+dfsg1-6+deb9u1
Distribution: stretch
Urgency: high
Maintainer: Debian Science Team 
<debian-science-maintainers@lists.alioth.debian.org>
Changed-By: Anton Gladky <gl...@debian.org>
Description:
 gnuplot    - Command-line driven interactive plotting program, version 5
 gnuplot-data - Command-line driven interactive plotting program. Data-files
 gnuplot-doc - Command-line driven interactive plotting program. Doc-package
 gnuplot-nox - Command-line driven interactive plotting program. No-X package
 gnuplot-qt - Command-line driven interactive plotting program. QT-package
 gnuplot-x11 - Command-line driven interactive plotting program. X-package
 gnuplot5   - transitional package
 gnuplot5-nox - transitional package
 gnuplot5-qt - transitional package
 gnuplot5-x11 - transitional package
Closes: 864901
Changes:
 gnuplot (5.0.5+dfsg1-6+deb9u1) stretch; urgency=high
 .
   * [02931b6] Fix memory corruption vulnerability. CVE-2017-9670.
               (Closes: #864901)
Checksums-Sha1:
 2f9abda7fa1a3878635051fa496f8f13f30ee39d 2976 gnuplot_5.0.5+dfsg1-6+deb9u1.dsc
 fa9caada877eee8e7f1d3cf476875a7c1df2fdb6 29016 
gnuplot_5.0.5+dfsg1-6+deb9u1.debian.tar.xz
 eb693349b75ce425b2903248108fe3f3e9023452 17972 
gnuplot_5.0.5+dfsg1-6+deb9u1_source.buildinfo
Checksums-Sha256:
 efbcdb3a0b0bf3a917709638490f32e4dfae10989eb9008f1ad94571b3777320 2976 
gnuplot_5.0.5+dfsg1-6+deb9u1.dsc
 9a36fc82ff524eeac84ec141e669344064d3b538fff6241819f75c706d897350 29016 
gnuplot_5.0.5+dfsg1-6+deb9u1.debian.tar.xz
 890895f4ce0daeaa49892e1fa58fa0e9d324dcde268d0eec97cd1e18f62616ac 17972 
gnuplot_5.0.5+dfsg1-6+deb9u1_source.buildinfo
Files:
 0ec196bc6aa951206cf8ea34528afbfe 2976 math optional 
gnuplot_5.0.5+dfsg1-6+deb9u1.dsc
 e6e783d07c10eb50853460da0e365eb6 29016 math optional 
gnuplot_5.0.5+dfsg1-6+deb9u1.debian.tar.xz
 25ce43ddb8674472389e680161c4cd9b 17972 math optional 
gnuplot_5.0.5+dfsg1-6+deb9u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=y1kN
-----END PGP SIGNATURE-----

--- End Message ---
-- 
debian-science-maintainers mailing list
debian-science-maintainers@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/debian-science-maintainers

Reply via email to