Vulnerability Database
Blog
FAQ
Docs
CVE-2025-31177
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2025-31177
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-31177.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-31177
Related
UBUNTU-CVE-2025-31177
Published
2025-05-07T21:16:03Z
Modified
2025-05-08T16:45:24.617928Z
Summary
[none]
Details
gnuplot is affected by a heap buffer overflow at function utf8
copy
one.
References
https://bugzilla.redhat.com/show_bug.cgi?id=2355342
https://access.redhat.com/security/cve/CVE-2025-31177
https://security-tracker.debian.org/tracker/CVE-2025-31177
Affected packages
Debian:11
/
gnuplot
Package
Name
gnuplot
Purl
pkg:deb/debian/gnuplot?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
5.*
5.4.1+dfsg1-1
5.4.1+dfsg1-1+deb11u1
5.4.2+dfsg2-1
5.4.2+dfsg2-2
5.4.4+dfsg1-1
5.4.4+dfsg1-2
6.*
6.0.0+dfsg1-1
6.0.0+dfsg1-2
6.0.0+dfsg1-3
6.0.2+dfsg1-1
Ecosystem specific
{ "urgency": "unimportant" }
Debian:12
/
gnuplot
Package
Name
gnuplot
Purl
pkg:deb/debian/gnuplot?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
5.*
5.4.4+dfsg1-2
6.*
6.0.0+dfsg1-1
6.0.0+dfsg1-2
6.0.0+dfsg1-3
6.0.2+dfsg1-1
Ecosystem specific
{ "urgency": "unimportant" }
Debian:13
/
gnuplot
Package
Name
gnuplot
Purl
pkg:deb/debian/gnuplot?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
5.*
5.4.4+dfsg1-2
6.*
6.0.0+dfsg1-1
6.0.0+dfsg1-2
6.0.0+dfsg1-3
6.0.2+dfsg1-1
Ecosystem specific
{ "urgency": "unimportant" }
CVE-2025-31177 - OSV