exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2014-024

Mandriva Linux Security Advisory 2014-024
Posted Jan 24, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-024 - Multiple buffer overflow vulnerabilities in graphviz due to an error within the yyerror() function (lib/cgraph/scan.l) which can be exploited to cause a stack-based buffer overflow via a specially crafted file.and the acceptance of an arbitrarily long digit list by a regular expression matched against user input. A build problem was discovered and fixed in swig while building graphviz for Business Server 1, related to the new php-5.5.x version as of the MDVSA-2014:014 advisory. Fixed swig packages is being provided with this advisory as well.

tags | advisory, overflow, php, vulnerability
systems | linux, mandriva
advisories | CVE-2014-0978, CVE-2014-1236
SHA-256 | 6996dd421efa9117f4b483fc6c479c51d2d2854a243ed739ddb0e740fc9be9d1

Mandriva Linux Security Advisory 2014-024

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2014:024
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : graphviz
Date : January 24, 2014
Affected: Business Server 1.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

Updated graphviz packages fix security vulnerabilities:

Multiple buffer overflow vulnerabilities in graphviz due to an
error within the yyerror() function (lib/cgraph/scan.l) which can
be exploited to cause a stack-based buffer overflow via a specially
crafted file (CVE-2014-0978) and the acceptance of an arbitrarily
long digit list by a regular expression matched against user input
(CVE-2014-1236).

A build problem was discovered and fixed in swig while building
graphviz for Business Server 1, related to the new php-5.5.x version as
of the MDVSA-2014:014 advisory. Fixed swig packages is being provided
with this advisory as well.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1236
https://bugzilla.redhat.com/show_bug.cgi?id=1049165
https://bugzilla.redhat.com/show_bug.cgi?id=1050872
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
2a18726d58e94c853368f61b74985621 mes5/i586/graphviz-2.20.2-3.2mdvmes5.2.i586.rpm
86576d993d8eb8d9d3cc3275fc59d05c mes5/i586/graphviz-doc-2.20.2-3.2mdvmes5.2.i586.rpm
9445dda34d27a127ab061e8ce46c33e7 mes5/i586/libgraphviz4-2.20.2-3.2mdvmes5.2.i586.rpm
17c580271cff60dd67812a76538b68f2 mes5/i586/libgraphviz-devel-2.20.2-3.2mdvmes5.2.i586.rpm
120f0bd74e4dba0c0b5828fd36114922 mes5/i586/libgraphvizlua0-2.20.2-3.2mdvmes5.2.i586.rpm
d2b1ce303b17c855ba9b1e0f36e63c27 mes5/i586/libgraphvizocaml0-2.20.2-3.2mdvmes5.2.i586.rpm
cc601eb1d97d5eed0207ad65fd684c14 mes5/i586/libgraphvizperl0-2.20.2-3.2mdvmes5.2.i586.rpm
901ab5b43b485b3b84400bc12c66a737 mes5/i586/libgraphvizphp0-2.20.2-3.2mdvmes5.2.i586.rpm
68471acd054c298d9b518962d8c0c82a mes5/i586/libgraphvizpython0-2.20.2-3.2mdvmes5.2.i586.rpm
efec65a3e46b17d91f56c92422da62b5 mes5/i586/libgraphvizr0-2.20.2-3.2mdvmes5.2.i586.rpm
a68d0aaefb900d581373ad90007dbf5b mes5/i586/libgraphvizruby0-2.20.2-3.2mdvmes5.2.i586.rpm
13efe709f3cc9dfe77f95d9617feb61b mes5/i586/libgraphviz-static-devel-2.20.2-3.2mdvmes5.2.i586.rpm
7c6ffe31b97e59ed5658c98ef82a1a6d mes5/i586/libgraphviztcl0-2.20.2-3.2mdvmes5.2.i586.rpm
17ca784b83a219d225db1331ac69e9f1 mes5/SRPMS/graphviz-2.20.2-3.2mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
fc261681ba0e67ae9dd5ab13e3b5595d mes5/x86_64/graphviz-2.20.2-3.2mdvmes5.2.x86_64.rpm
3af864974719f5e7119d96246e7496e5 mes5/x86_64/graphviz-doc-2.20.2-3.2mdvmes5.2.x86_64.rpm
b3f45e5ba5980d9eaba89d38ab552e87 mes5/x86_64/lib64graphviz4-2.20.2-3.2mdvmes5.2.x86_64.rpm
a0a671a56a1215ce1429062f7362d763 mes5/x86_64/lib64graphviz-devel-2.20.2-3.2mdvmes5.2.x86_64.rpm
b1beabec6196ab963f990d1f95d59415 mes5/x86_64/lib64graphvizlua0-2.20.2-3.2mdvmes5.2.x86_64.rpm
fadbd28da4026a41d38e7e95b953867e mes5/x86_64/lib64graphvizocaml0-2.20.2-3.2mdvmes5.2.x86_64.rpm
45399effafea89c1255ac03004591005 mes5/x86_64/lib64graphvizperl0-2.20.2-3.2mdvmes5.2.x86_64.rpm
97ebf63c09b7b6dacace0b14d5e03530 mes5/x86_64/lib64graphvizphp0-2.20.2-3.2mdvmes5.2.x86_64.rpm
bb3a68ba425490db3d8dd5ef6e4938d7 mes5/x86_64/lib64graphvizpython0-2.20.2-3.2mdvmes5.2.x86_64.rpm
6cc193e79ac549b18ddc2b90b2aac175 mes5/x86_64/lib64graphvizr0-2.20.2-3.2mdvmes5.2.x86_64.rpm
d8fc40ea3f32a4cbea5df1b788b216a3 mes5/x86_64/lib64graphvizruby0-2.20.2-3.2mdvmes5.2.x86_64.rpm
43c70bfc1265ab90359d7c2384e093d1 mes5/x86_64/lib64graphviz-static-devel-2.20.2-3.2mdvmes5.2.x86_64.rpm
2f8a47d9bfacac7f54db914485f64b9b mes5/x86_64/lib64graphviztcl0-2.20.2-3.2mdvmes5.2.x86_64.rpm
17ca784b83a219d225db1331ac69e9f1 mes5/SRPMS/graphviz-2.20.2-3.2mdvmes5.2.src.rpm

Mandriva Business Server 1/X86_64:
c4a2b0a3bc7bece8cd82a3f2bf33b9ec mbs1/x86_64/graphviz-2.28.0-6.1.mbs1.x86_64.rpm
38a95799fa68b8ac74aab2d378fdff0d mbs1/x86_64/graphviz-doc-2.28.0-6.1.mbs1.noarch.rpm
7844c839811ddb469b51f25569ed21df mbs1/x86_64/java-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
f0330cca4194aba5f235ec40be9e06a6 mbs1/x86_64/lib64cdt5-2.28.0-6.1.mbs1.x86_64.rpm
beea5b9f76b6a46c5a930a2bbbe73ef8 mbs1/x86_64/lib64cgraph6-2.28.0-6.1.mbs1.x86_64.rpm
f9bce656a8a26190a01d935ad82f47fd mbs1/x86_64/lib64graph5-2.28.0-6.1.mbs1.x86_64.rpm
f6c7bbd2b7580701743b9b9df646ce00 mbs1/x86_64/lib64graphviz-devel-2.28.0-6.1.mbs1.x86_64.rpm
5992fe4c4ac3523f5687f691951bab67 mbs1/x86_64/lib64graphviz-static-devel-2.28.0-6.1.mbs1.x86_64.rpm
dd603bae4c8540bc80390e58104dd568 mbs1/x86_64/lib64gvc6-2.28.0-6.1.mbs1.x86_64.rpm
1f3ac007dd967212210a49a606a5d599 mbs1/x86_64/lib64gvpr2-2.28.0-6.1.mbs1.x86_64.rpm
0f152246430a424db26f1fa0d772556e mbs1/x86_64/lib64pathplan4-2.28.0-6.1.mbs1.x86_64.rpm
33cea7ad1a9cb603e8d3d361f34af188 mbs1/x86_64/lib64xdot4-2.28.0-6.1.mbs1.x86_64.rpm
79bb1872f74ff1825becb063b202d526 mbs1/x86_64/lua-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
c2f5d1e77e5e663b33e5a34e28037dfb mbs1/x86_64/ocaml-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
cecbc7bd9a8a76cce221b395a7af9b28 mbs1/x86_64/perl-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
5eb2b87e00dab8b5721181230cad121a mbs1/x86_64/php-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
d23e5e65d6b13c3a1df438a85969bc40 mbs1/x86_64/python-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
e9c24b78474573fbf81978d310cae19f mbs1/x86_64/ruby-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
9ad6503244d2d2b4714b1eed1701dbe0 mbs1/x86_64/swig-2.0.4-3.1.mbs1.x86_64.rpm
08d95c34769002e720389c90acdf8266 mbs1/x86_64/swig-doc-2.0.4-3.1.mbs1.noarch.rpm
0a1616edc56cdf37d172ccd7c4104171 mbs1/x86_64/tcl-graphviz-2.28.0-6.1.mbs1.x86_64.rpm
fe836234b265f655322cf3d3003e9c0a mbs1/SRPMS/graphviz-2.28.0-6.1.mbs1.src.rpm
41904d36e1861ad361d3f9903ad16265 mbs1/SRPMS/swig-2.0.4-3.1.mbs1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFS4pIYmqjQ0CJFipgRAsYeAKDZTVgWWqa/gn1HbgduFv/6k3YrQACfYvVi
9jsOzGcxsc+GPeiDRHKqJtQ=
=wcCA
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close