First published: Thu Jan 09 2014(Updated: )
Graphviz, a collection of tools for the manipulation and layout of graphs, was recently reported to be affected by a buffer overflow vulnerability from user input, which seem to be caused due to the acceptance of arbitrary long digit list by regex. References: <a href="http://seclists.org/oss-sec/2014/q1/46">http://seclists.org/oss-sec/2014/q1/46</a> Commit: <a href="https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff">https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphviz Graphviz | =2.34.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.