{"id":"MGASA-2014-0027","summary":"Updated graphviz packages fix security vulnerabilities","details":"Updated graphviz packages fix security vulnerabilities:\n\nMultiple buffer overflow vulnerabilities in graphviz due to an error within\nthe \"yyerror()\" function (lib/cgraph/scan.l) which can be exploited to cause\na stack-based buffer overflow via a specially crafted file (CVE-2014-0978)\nand the acceptance of an arbitrarily long digit list by a regular expression\nmatched against user input (CVE-2014-1236).\n","modified":"2026-04-16T06:25:39.183974335Z","published":"2014-01-24T21:02:52Z","upstream":["CVE-2014-0978","CVE-2014-1236"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0027.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1049165"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1050872"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=12239"}],"affected":[{"package":{"name":"graphviz","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/graphviz?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.28.0-11.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0027.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}