Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."Referenceshttp://seclists.org/oss-sec/2014/q1/51http://osvdb.org/101851http://www.mandriva.com/security/advisories?name=MDVSA-2014:024https://security.gentoo.org/glsa/201702-06http://seclists.org/oss-sec/2014/q1/54https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ffhttp://www.debian.org/security/2014/dsa-2843http://seclists.org/oss-sec/2014/q1/46https://bugzilla.redhat.com/show_bug.cgi?id=1050872http://www.securityfocus.com/bid/64737http://secunia.com/advisories/55666http://secunia.com/advisories/56244