Ubuntu Security Notice USN-5971-1 ≈ Packet Storm

Ubuntu Security Notice USN-5971-1 ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

Ubuntu Security Notice USN-5971-1[6]
Authored by Ubuntu[7] | Site security.ubuntu.com[8]

Ubuntu Security Notice 5971-1 - It was discovered that graphviz contains null pointer dereference vulnerabilities. Exploitation via a specially crafted input file can cause a denial of service. This issue only affected Ubuntu 18.04 LTS. It was discovered that graphviz contains null pointer dereference vulnerabilities. Exploitation via a specially crafted input file can cause a denial of service. These issues only affected Ubuntu 14.04 ESM and Ubuntu 18.04 LTS.

systems | linux[9], ubuntu[10]
advisories | CVE-2018-10196[11], CVE-2019-11023[12], CVE-2020-18032[13]
SHA-256 | c1e4e6082f66bee1682fb46485c96fb0aefb44693fdb6e45d3184afe5b63d3e3

Change Mirror[17] Download[18]

        ==========================================================================
Ubuntu Security Notice USN-5971-1
March 24, 2023
graphviz vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 ESM
- Ubuntu 18.04 ESM
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in graphviz.
Software Description:
- graphviz: rich set of graph drawing tools
Details:
It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file can cause
a denial of service. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-10196)
It was discovered that graphviz contains null pointer dereference
vulnerabilities. Exploitation via a specially crafted input file can cause
a denial of service. These issues only affected Ubuntu 14.04 ESM and Ubuntu
18.04 LTS. (CVE-2019-11023)
It was discovered that graphviz contains a buffer overflow vulnerability.
Exploitation via a specially crafted input file can cause a denial of
service or possibly allow for arbitrary code execution. These issues only
affected Ubuntu 14.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2020-18032)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 ESM:
graphviz 2.42.2-3ubuntu0.1~esm1
Ubuntu 18.04 ESM:
graphviz 2.40.1-2ubuntu0.1~esm1
Ubuntu 14.04 ESM:
graphviz 2.36.0-0ubuntu3.2+esm1
The problem can be corrected by updating your system to the following
package versions:
References:
https://ubuntu.com/security/notices/USN-5971-1
CVE-2018-10196, CVE-2019-11023, CVE-2020-18032

Login[19] or Register[20] to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services[125]
Hosting By
Rokasec[126]
close

Read more

Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"