CVE-2023-46045
NixOS vulnerability analysis and mitigation

Overview

Graphviz versions 2.36.0 through 9.x before 10.0.1 contain an out-of-bounds read vulnerability that can be triggered via a crafted config6a file. The vulnerability was discovered in late 2023 and was assigned CVE-2023-46045. While the vulnerability affects a wide range of versions, its exploitability is considered limited because the affected config6a file is typically owned by root (NVD, Full Disclosure).

Technical details

The vulnerability is classified as an out-of-bounds read issue (CWE-125) with a CVSS v3.1 base score of 7.8 (High). The vulnerability vector is CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access, low attack complexity, no privileges required, and user interaction required. The issue was introduced in version 2.36.0 through commit cf95714837f06f684929b54659523c2c9b1fc19f and was later fixed by essentially reverting this commit in version 10.0.1 (Full Disclosure, NVD).

Impact

The vulnerability could potentially lead to information disclosure, integrity compromise, and availability issues due to the out-of-bounds read condition. However, the actual impact is mitigated by the fact that the vulnerable config6a file is typically owned by root, which limits the attack surface (NVD).

Mitigation and workarounds

The vulnerability has been fixed in Graphviz version 10.0.1. Users are advised to upgrade to this version or later to address the issue. The fix was implemented by reverting the commit that introduced the vulnerability through commit a95f977f5d809915ec4b14836d2b5b7f5e74881e (Full Disclosure).

Community reactions

The Graphviz maintainers, while not initially consulted about the CVE assignment, chose not to contest it despite some debate about its security impact. There was some discussion in the security community about whether this issue warranted a CVE, given that it requires root file access to exploit (OSS Security).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68120MEDIUM5.4
  • NixOSNixOS
  • go
NoYesDec 30, 2025
CVE-2025-69413MEDIUM5.3
  • NixOSNixOS
  • code.gitea.io/gitea
NoYesJan 01, 2026
CVE-2025-15412MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-15411MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-68932LOW2.9
  • NixOSNixOS
  • freshrss
NoYesDec 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management