# Security update for gnuplot Announcement ID: SUSE-SU-2025:01811-1 Release Date: 2025-06-04T09:29:58Z Rating: moderate References: * bsc#1240325 * bsc#1240326 * bsc#1240327 * bsc#1240328 * bsc#1240329 * bsc#1240330 * bsc#1241684 Cross-References: * CVE-2025-31176 * CVE-2025-31177 * CVE-2025-31178 * CVE-2025-31179 * CVE-2025-31180 * CVE-2025-31181 * CVE-2025-3359 CVSS scores: * CVE-2025-31176 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31176 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31177 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31178 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31178 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31179 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31179 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31180 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31180 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31181 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-31181 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3359 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-3359 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3359 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities can now be installed. ## Description: This update for gnuplot fixes the following issues: * CVE-2025-31176: invalid read leads to segmentation fault on plot3d_points (bsc#1240325). * CVE-2025-31177: improper bounds check leads to heap-buffer overflow on utf8_copy_one (bsc#1240326). * CVE-2025-31178: unvalidated user input leads to segmentation fault on GetAnnotateString (bsc#1240327). * CVE-2025-31179: improper verification of time values leads to segmentation fault on xstrftime (bsc#1240328). * CVE-2025-31180: unchecked invalid pointer access leads to segmentation fault on CANVAS_text (bsc#1240329). * CVE-2025-31181: double fclose() call leads to segmentation fault on X11_graphics (bsc#1240330). * CVE-2025-3359: out-of-bounds read when parsing font names may lead to a segmentation fault (bsc#1241684). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1811=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1811=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1811=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gnuplot-debugsource-5.4.3-150400.3.3.1 * gnuplot-debuginfo-5.4.3-150400.3.3.1 * gnuplot-5.4.3-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * gnuplot-doc-5.4.3-150400.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * gnuplot-debugsource-5.4.3-150400.3.3.1 * gnuplot-debuginfo-5.4.3-150400.3.3.1 * gnuplot-5.4.3-150400.3.3.1 * openSUSE Leap 15.6 (noarch) * gnuplot-doc-5.4.3-150400.3.3.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * gnuplot-debugsource-5.4.3-150400.3.3.1 * gnuplot-debuginfo-5.4.3-150400.3.3.1 * gnuplot-5.4.3-150400.3.3.1 * Server Applications Module 15-SP6 (noarch) * gnuplot-doc-5.4.3-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31176.html * https://www.suse.com/security/cve/CVE-2025-31177.html * https://www.suse.com/security/cve/CVE-2025-31178.html * https://www.suse.com/security/cve/CVE-2025-31179.html * https://www.suse.com/security/cve/CVE-2025-31180.html * https://www.suse.com/security/cve/CVE-2025-31181.html * https://www.suse.com/security/cve/CVE-2025-3359.html * https://bugzilla.suse.com/show_bug.cgi?id=1240325 * https://bugzilla.suse.com/show_bug.cgi?id=1240326 * https://bugzilla.suse.com/show_bug.cgi?id=1240327 * https://bugzilla.suse.com/show_bug.cgi?id=1240328 * https://bugzilla.suse.com/show_bug.cgi?id=1240329 * https://bugzilla.suse.com/show_bug.cgi?id=1240330 * https://bugzilla.suse.com/show_bug.cgi?id=1241684