Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 07 Jan 2014 12:52:19 +0530
From: Ratul Gupta <ratulg@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE Request: graphviz: stack-based buffer overflow in yyerror()

Hello,

Graphviz, a collection of tools for the manipulation and layout of 
graphs, was recently reported to be affected by a buffer overflow 
vulnerability.

The vulnerability is caused due to an error within the "yyerror()" 
function (lib/cgraph/scan.l) and can be exploited to cause a stack-based 
buffer overflow via a specially crafted file.

Can a CVE please be assigned to this issue?

References:
http://secunia.com/advisories/55666/
https://bugzilla.redhat.com/show_bug.cgi?id=1049165

-- 
Regards,

Ratul Gupta / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ