MGASA-2014-0027

Source
https://advisories.mageia.org/MGASA-2014-0027.html
Import Source
https://advisories.mageia.org/MGASA-2014-0027.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0027
Upstream
Published
2014-01-24T21:02:52Z
Modified
2026-04-16T06:25:39.183974335Z
Summary
Updated graphviz packages fix security vulnerabilities
Details

Updated graphviz packages fix security vulnerabilities:

Multiple buffer overflow vulnerabilities in graphviz due to an error within the "yyerror()" function (lib/cgraph/scan.l) which can be exploited to cause a stack-based buffer overflow via a specially crafted file (CVE-2014-0978) and the acceptance of an arbitrarily long digit list by a regular expression matched against user input (CVE-2014-1236).

References
Credits

Affected packages

Mageia:3 / graphviz

Package

Name
graphviz
Purl
pkg:rpm/mageia/graphviz?arch=source&distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.28.0-11.1.mga3

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2014-0027.json"