Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "graphviz", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "graphviz-dev", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "graphviz-doc", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libcdt5", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libcgraph6", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgraphviz-dev", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgv-guile", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgv-lua", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgv-perl", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgv-php5", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgv-python", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgv-ruby", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgv-tcl", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgvc6", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgvc6-plugins-gtk", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libgvpr2", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libpathplan4", "binary_version": "2.36.0-0ubuntu3.1" }, { "binary_name": "libxdot4", "binary_version": "2.36.0-0ubuntu3.1" } ] }