Debian Security Advisory
DLA-2659-1 graphviz -- LTS security update
- Date Reported:
- 13 May 2021
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 898841, Bug 988000.
In Mitre's CVE dictionary: CVE-2018-10196, CVE-2020-18032.
- More information:
NULL pointer dereference vulnerability in the rebuild_vlists function in lib/dotgen/conc.c in the dotgen library allows remote attackers to cause a denial of service (application crash) via a crafted file.
A buffer overflow was discovered in Graphviz, which could potentially result in the execution of arbitrary code when processing a malformed file.
For Debian 9 stretch, these problems have been fixed in version 2.38.0-17+deb9u1.
We recommend that you upgrade your graphviz packages.
For the detailed security status of graphviz please refer to its security tracker page at: https://security-tracker.debian.org/tracker/graphviz
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS