Bugzilla – Bug 857854
VUL-1: CVE-2014-0978: graphviz: stack-based buffer overflow in yyerror()
Last modified: 2020-04-01 22:10:13 UTC
OSS:11810 CVE-2014-0978 References: http://secunia.com/advisories/55666/ https://bugzilla.redhat.com/show_bug.cgi?id=1049165 http://comments.gmane.org/gmane.comp.security.oss.general/11810
Issue minor enough to just update Factory.
Seems like their commit d266bb2b4154d11c27252b56d86963aef4434750 also fixes an additional sprintf().
bugbot adjusting priority
Two additional CVEs because of improper fix. > a sprintf() which is also later removed by commit > d266bb2b4154d11c27252b56d86963aef4434750 just for safety reasons. Use CVE-2014-1235. > chkNum: > also looks like a buffer overflow from user input; yet unfixed. > (the regex seems to accept arbitrary long digit list) Use CVE-2014-1236.
Should be enough to fix in Factory.
This has already been fixed in factory with 2.36.0 in february. I just forgot to state that in this bug and close it.