Amazon Linux 1 Security Advisory: ALAS-2014-296
Advisory Release Date: 2014-03-06 14:55 Pacific
Advisory Updated Date: 2014-09-16 22:35 Pacific
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file.
Graphviz was recently reported to be affected by a buffer overflow vulnerability, which seem to have introduced in the fix for CVE-2014-0978.
Affected Packages:
graphviz
Issue Correction:
Run yum update graphviz to update your system.
i686:
graphviz-lua-2.30.1-12.39.amzn1.i686
graphviz-java-2.30.1-12.39.amzn1.i686
graphviz-python-2.30.1-12.39.amzn1.i686
graphviz-ruby-2.30.1-12.39.amzn1.i686
graphviz-guile-2.30.1-12.39.amzn1.i686
graphviz-php54-2.30.1-12.39.amzn1.i686
graphviz-tcl-2.30.1-12.39.amzn1.i686
graphviz-gd-2.30.1-12.39.amzn1.i686
graphviz-doc-2.30.1-12.39.amzn1.i686
graphviz-graphs-2.30.1-12.39.amzn1.i686
graphviz-devel-2.30.1-12.39.amzn1.i686
graphviz-2.30.1-12.39.amzn1.i686
graphviz-debuginfo-2.30.1-12.39.amzn1.i686
graphviz-perl-2.30.1-12.39.amzn1.i686
graphviz-R-2.30.1-12.39.amzn1.i686
src:
graphviz-2.30.1-12.39.amzn1.src
x86_64:
graphviz-guile-2.30.1-12.39.amzn1.x86_64
graphviz-gd-2.30.1-12.39.amzn1.x86_64
graphviz-doc-2.30.1-12.39.amzn1.x86_64
graphviz-R-2.30.1-12.39.amzn1.x86_64
graphviz-ruby-2.30.1-12.39.amzn1.x86_64
graphviz-lua-2.30.1-12.39.amzn1.x86_64
graphviz-tcl-2.30.1-12.39.amzn1.x86_64
graphviz-2.30.1-12.39.amzn1.x86_64
graphviz-java-2.30.1-12.39.amzn1.x86_64
graphviz-debuginfo-2.30.1-12.39.amzn1.x86_64
graphviz-perl-2.30.1-12.39.amzn1.x86_64
graphviz-graphs-2.30.1-12.39.amzn1.x86_64
graphviz-devel-2.30.1-12.39.amzn1.x86_64
graphviz-python-2.30.1-12.39.amzn1.x86_64
graphviz-php54-2.30.1-12.39.amzn1.x86_64