Bug 1629985
| Summary: | mgetty: Out-of-bound access in putwhitespan() function g3/g32pbm.c | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED NOTABUG | QA Contact: | |||||
| Severity: | low | Docs Contact: | |||||
| Priority: | low | ||||||
| Version: | unspecified | CC: | abhgupta, dbaker, jokerman, msekleta, rschiron, sthangav, trankin, zdohnal | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | mgetty 1.2.1 | Doc Type: | If docs needed, set a value | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2018-10-22 09:49:42 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 1629986 | ||||||
| Bug Blocks: | 1629987 | ||||||
| Attachments: |
|
||||||
|
Description
Pedro Sampaio
2018-09-17 17:50:29 UTC
Created mgetty tracking bugs for this issue: Affects: fedora-all [bug 1629986] The main function in g3/pbm2g3.c does not check whether `xsize` and `ysize` variables are negative, which result in an out-of-bounds read in putwhitespan() when called from convert_pbm(). Created attachment 1486347 [details]
upstream patch
This patch was extracted from mgetty-1.2.1.
Closing as NOTABUG as it was not deemed to be CVE-worthy. mgetty-1.1.37-10.fc28 has been pushed to the Fedora 28 stable repository. If problems still persist, please make note of it in this bug report. mgetty-1.1.37-11.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report. |