Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.
{
"binaries": [
{
"binary_name": "graphviz",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "graphviz-dev",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libcdt5",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libcgraph6",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgraphviz-dev",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgv-guile",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgv-lua",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgv-perl",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgv-php5",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgv-python",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgv-ruby",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgv-tcl",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgvc6",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgvc6-plugins-gtk",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libgvpr2",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libpathplan4",
"binary_version": "2.36.0-0ubuntu3.1"
},
{
"binary_name": "libxdot4",
"binary_version": "2.36.0-0ubuntu3.1"
}
],
"availability": "No subscription required"
}