Article Source Mandriva Linux Security Advisories
A vulnerability was discovered and corrected in graphviz:
Stack-based buffer overflow in the push_subg function in parser.y
(lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions,
allows user-assisted remote attackers to cause a denial of service
(memory corruption) or execute arbitrary code via a DOT file with a
large number of Agraph_t elements (CVE-2008-4555).
This update provides a fix for this vulnerability.
Update:
Packages for 2008.0 are being provided due to extended support for
Corporate products.