CVE-2014-1235

NameCVE-2014-1235
DescriptionStack-based buffer overflow in the "yyerror" function in Graphviz 2.34.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted file. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-0978.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs734745

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
graphviz (PTS)jessie, jessie (lts)2.38.0-7+deb8u1fixed
stretch (security), stretch (lts), stretch2.38.0-17+deb9u1fixed
buster (security), buster, buster (lts)2.40.1-6+deb10u1fixed
bullseye2.42.2-5+deb11u1fixed
bookworm2.42.2-7+deb12u1fixed
sid, trixie2.42.4-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
graphvizsourcesqueeze(not affected)
graphvizsourcewheezy(not affected)
graphvizsource(unstable)2.26.3-16.1734745

Notes

[wheezy] - graphviz <not-affected> (CVE for additional buffer overflow introduced by 7aaddf52cd98589fb0c3ab72a393f8411838438a)
[squeeze] - graphviz <not-affected> (CVE for additional buffer overflow introduced by 7aaddf52cd98589fb0c3ab72a393f8411838438a)
CVE is for buffer overflow introduced by applying only 7aaddf52cd98589fb0c3ab72a393f8411838438a
fix: https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750

Search for package or bug name: Reporting problems