Summary: | <media-gfx/graphviz-2.36.0: "yyerror()" Buffer Overflow Vulnerability (CVE-2014-{0978,1235,1236}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | graphics+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/55666/ | ||
Whiteboard: | B2 [glsa cve cleanup] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 529462, 594194 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() CVE-2014-1236 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1236): Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list." CVE-2014-0978 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0978): Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file. the fixed version was already stabilized But we cannot clean vulnerable versions until bug 594194 is solved This fix for CVE-2014-0978 introduced the possible buffer overflow vulnerability that received the name CVE-2014-1235. Upstream fix: https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750 Fix is present in =media-gfx/graphviz-2.36.0. New GLSA request filed. This issue was resolved and addressed in GLSA 201702-06 at https://security.gentoo.org/glsa/201702-06 by GLSA coordinator Thomas Deutschmann (whissi). |