Bug 1629985
Summary: | mgetty: Out-of-bound access in putwhitespan() function g3/g32pbm.c | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED NOTABUG | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | abhgupta, dbaker, jokerman, msekleta, rschiron, sthangav, trankin, zdohnal | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | mgetty 1.2.1 | Doc Type: | If docs needed, set a value | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2018-10-22 09:49:42 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1629986 | ||||||
Bug Blocks: | 1629987 | ||||||
Attachments: |
|
Description
Pedro Sampaio
2018-09-17 17:50:29 UTC
Created mgetty tracking bugs for this issue: Affects: fedora-all [bug 1629986] The main function in g3/pbm2g3.c does not check whether `xsize` and `ysize` variables are negative, which result in an out-of-bounds read in putwhitespan() when called from convert_pbm(). Created attachment 1486347 [details]
upstream patch
This patch was extracted from mgetty-1.2.1.
Closing as NOTABUG as it was not deemed to be CVE-worthy. mgetty-1.1.37-10.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report. mgetty-1.1.37-11.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report. |