Mageia 2021-0228: graphviz security update
Summary
Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component. (CVE-2020-18032)
References
- https://bugs.mageia.org/show_bug.cgi?id=28989
- https://www.debian.org/security/2021/dsa-4914
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTXOIYNDR72EDFNCBXMS56IU6ZLZOJMB/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032
Resolution
MGASA-2021-0228 - Updated graphviz packages fix a security vulnerability
SRPMS
- 8/core/graphviz-2.44.1-2.1.mga8
- 7/core/graphviz-2.40.1-17.2.mga7