Ubuntu Security Notice 5971-1 - It was discovered that graphviz contains null pointer dereference vulnerabilities. Exploitation via a specially crafted input file can cause a denial of service. This issue only affected Ubuntu 18.04 LTS. It was discovered that graphviz contains null pointer dereference vulnerabilities. Exploitation via a specially crafted input file can cause a denial of service. These issues only affected Ubuntu 14.04 ESM and Ubuntu 18.04 LTS.
c1e4e6082f66bee1682fb46485c96fb0aefb44693fdb6e45d3184afe5b63d3e3
==========================================================================
Ubuntu Security Notice USN-5971-1
March 24, 2023
graphviz vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 ESM
- Ubuntu 18.04 ESM
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in graphviz.
Software Description:
- graphviz: rich set of graph drawing tools
Details:
It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file can cause
a denial of service. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-10196)
It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file can cause
a denial of service. These issues only affected Ubuntu 14.04 ESM and Ubuntu
18.04 LTS. (CVE-2019-11023)
It was discovered that graphviz contains a buffer overflow vulnerability.
Exploitation via a specially crafted input file can cause a denial of
service or possibly allow for arbitrary code execution. These issues only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-18032)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 ESM:
graphviz 2.42.2-3ubuntu0.1~esm1
Ubuntu 18.04 ESM:
graphviz 2.40.1-2ubuntu0.1~esm1
Ubuntu 14.04 ESM:
graphviz 2.36.0-0ubuntu3.2+esm1
The problem can be corrected by updating your system to the following
package versions:
References:
https://ubuntu.com/security/notices/USN-5971-1
CVE-2018-10196, CVE-2019-11023, CVE-2020-18032