An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file. Upstream bug: https://sourceforge.net/p/gnuplot/bugs/1933/
It seems gnuplot-5.2.rc1 was never added to gx86.
@Maintainers, 5.2 was released in September, could you please confirm if the fix is available? Thank you
I have just committed sci-visualization/gnuplot-5.2.2 and I have verified that it contains the fix attached to the upstream bug: https://sourceforge.net/p/gnuplot/bugs/1933/ (In reply to Christoph Junghans from comment #1) > It seems gnuplot-5.2.rc1 was never added to gx86. Right, and the 5.0 series did not yet support the "set ttics" command. The only version that was affected was the live ebuild (5.1.9999) which never had any keywords (and is gone by now).