Package: gnuplot
Version: 4.0.0-2
Severity: important

There's a buffer overflow in one part of the patch:

   +++ gnuplot-4.0.0/src/term.c
   ...
   +  char *binname = "/gnuplot_x11";
   +  char *fullname;
   ...
   +  fullname = (char*)malloc(sizeof(X11_DRIVER_DIR) + sizeof(binname) + 1);
   +  strcat(fullname, X11_DRIVER_DIR);
   +  strcat(fullname, binname);

sizeof(binname) will return only 4. (the size of the poiner)
So strcat() will write over unallocated memory.

Please either use strlen() for binname and X11_DRIVER_DIR,
or just asprintf().

I am not sure, if this can be exploited and if it could, if
it is a security issue.


    Elrond


p.s.: Can you please remove changelog.latin1 from the
      debian .diff.gz?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to