From ${URL} : Description A vulnerability has been reported in Graphviz, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error within the "yyerror()" function (lib/cgraph/scan.l) and can be exploited to cause a stack-based buffer overflow via a specially crafted file. The vulnerability is reported in version 2.34.0. Other versions may also be affected. Solution: Fixed in the source code repository. Further details available to Secunia VIM customers Provided and/or discovered by: Reported by the vendor. Original Advisory: https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2014-1236 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1236): Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list." CVE-2014-0978 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0978): Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file.
the fixed version was already stabilized
But we cannot clean vulnerable versions until bug 594194 is solved
This fix for CVE-2014-0978 introduced the possible buffer overflow vulnerability that received the name CVE-2014-1235. Upstream fix: https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750 Fix is present in =media-gfx/graphviz-2.36.0. New GLSA request filed.
This issue was resolved and addressed in GLSA 201702-06 at https://security.gentoo.org/glsa/201702-06 by GLSA coordinator Thomas Deutschmann (whissi).