Bug#864907: unblock: gnuplot/5.0.5+dfsg1-7, CVE-2017-9670
Package: release.debian.org
Severity: normal
Tags: security upstream patch
User: release.debian.org@packages.debian.org
Usertags: unblock
Please unblock package gnuplot
it fixes CVE-2017-9670. The fix is trivial. Patch is attached.
unblock gnuplot/5.0.5+dfsg1-7
The diff is attached.
Thanks
Anton
diff --git a/debian/changelog b/debian/changelog
index 3705f0e..a27d6a4 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+gnuplot (5.0.5+dfsg1-7) unstable; urgency=high
+
+ * [02931b6] Fix memory corruption vulnerability. CVE-2017-9670.
+ (Closes: #864901)
+
+ -- Anton Gladky <gladk@debian.org> Fri, 16 Jun 2017 22:35:29 +0200
+
gnuplot (5.0.5+dfsg1-6) unstable; urgency=medium
* Team upload.
diff --git a/debian/patches/20_CVE-2017-9670.patch b/debian/patches/20_CVE-2017-9670.patch
new file mode 100644
index 0000000..482ea7e
--- /dev/null
+++ b/debian/patches/20_CVE-2017-9670.patch
@@ -0,0 +1,18 @@
+Description: Fix memory corruption vulnerability. CVE-2017-9670
+Author: Ethan Merritt
+Bug-Debian: https://bugs.debian.org/864901
+Origin: https://sourceforge.net/p/gnuplot/bugs/_discuss/thread/44ec637c/af0f/attachment/uninitialized_variables_%28Bug1933%29.patch
+Bug: https://sourceforge.net/p/gnuplot/bugs/1933/
+Reviewed-By: Anton Gladky <gladk@debian.org>
+Last-Update: 2017-06-16
+
+--- gnuplot-5.0.5+dfsg1.orig/src/set.c
++++ gnuplot-5.0.5+dfsg1/src/set.c
+@@ -5926,6 +5926,7 @@ load_tic_series(AXIS_INDEX axis)
+
+ if (!equals(c_token, ",")) {
+ /* only step specified */
++ incr_token = c_token;
+ incr = start;
+ start = -VERYLARGE;
+ end = VERYLARGE;
diff --git a/debian/patches/series b/debian/patches/series
index 94e0bfa..3c19808 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -6,3 +6,4 @@
11_fix_linkage_wx.patch
13_honour_SOURCE_DATE_EPOCH.patch
14_strip_username_from_output.patch
+20_CVE-2017-9670.patch
Reply to: