A vulnerability was found in mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS , the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file.
Created mgetty tracking bugs for this issue: Affects: fedora-all [bug 1740488]
External References: https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/
IMO it is already recognized as vulnerability in https://bugzilla.redhat.com/show_bug.cgi?id=1629985 , so this is duplicate bug.
(In reply to Zdenek Dohnal from comment #3) > IMO it is already recognized as vulnerability in > https://bugzilla.redhat.com/show_bug.cgi?id=1629985 , so this is duplicate > bug. What do you think about it, Dhananjay?
Patch: https://bugzilla.redhat.com/attachment.cgi?id=1486347