First published: Thu Jan 09 2014(Updated: )
Graphviz, a collection of tools for the manipulation and layout of graphs, was recently reported to be affected by a buffer overflow vulnerability, which seem to have introduced in the fix for <a href="https://access.redhat.com/security/cve/CVE-2014-0978">CVE-2014-0978</a>. References: <a href="http://seclists.org/oss-sec/2014/q1/46">http://seclists.org/oss-sec/2014/q1/46</a> Commit: <a href="https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750">https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Graphviz |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1050871 is classified as high due to its potential to cause a buffer overflow.
To fix REDHAT-BUG-1050871, you should update to the latest version of Graphviz that addresses this vulnerability.
REDHAT-BUG-1050871 affects multiple versions of Graphviz, specifically those prior to the patch that resolves the buffer overflow issue.
Currently, there are no confirmed workarounds for REDHAT-BUG-1050871 other than applying the necessary patch.
The vulnerability REDHAT-BUG-1050871 was reported by researchers focusing on security issues in software applications.