[prev in list] [next in list] [prev in thread] [next in thread] 

List:       ubuntu-security-announce
Subject:    [USN-5971-1] Graphviz vulnerabilities
From:       Mark Esler <mark.esler () canonical ! com>
Date:       2023-03-24 3:15:51
Message-ID: e017b94c-ea62-dd3b-6b04-164aadc8bb0a () canonical ! com
[Download RAW message or body]

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
[Attachment #2 (multipart/mixed)]

[Attachment #4 (multipart/mixed)]

[Attachment #6 (text/plain)]

==========================================================================
Ubuntu Security Notice USN-5971-1
March 24, 2023

graphviz vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 ESM
- Ubuntu 18.04 ESM
- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in graphviz.

Software Description:
- graphviz: rich set of graph drawing tools

Details:

It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file can cause
a denial of service. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-10196)

It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file can cause
a denial of service. These issues only affected Ubuntu 14.04 ESM and Ubuntu
18.04 LTS. (CVE-2019-11023)

It was discovered that graphviz contains a buffer overflow vulnerability.
Exploitation via a specially crafted input file can cause a denial of
service or possibly allow for arbitrary code execution. These issues only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-18032)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 ESM:
graphviz 2.42.2-3ubuntu0.1~esm1

Ubuntu 18.04 ESM:
graphviz 2.40.1-2ubuntu0.1~esm1

Ubuntu 14.04 ESM:
graphviz 2.36.0-0ubuntu3.2+esm1

The problem can be corrected by updating your system to the following
package versions:

References:
https://ubuntu.com/security/notices/USN-5971-1
CVE-2018-10196, CVE-2019-11023, CVE-2020-18032

["OpenPGP_0xD60B83C90513BD4F.asc" (application/pgp-keys)]
["OpenPGP_signature.asc" (application/pgp-signature)]
[Attachment #9 (unknown)]




[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic