Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "graphviz" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "graphviz-dev" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "graphviz-doc" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libcdt5" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libcgraph6" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgraphviz-dev" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgv-guile" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgv-lua" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgv-perl" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgv-php5" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgv-python" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgv-ruby" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgv-tcl" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgvc6" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgvc6-plugins-gtk" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libgvpr2" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libpathplan4" }, { "binary_version": "2.36.0-0ubuntu3.1", "binary_name": "libxdot4" } ] }