Bug 1740487 (CVE-2019-1010190) - CVE-2019-1010190 mgetty: out-of-bounds read in function putwhitespan() in g3/pbm2g3.c causing denial of service
Summary: CVE-2019-1010190 mgetty: out-of-bounds read in function putwhitespan() in g3/...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-1010190
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1629986 1740488 1793528
Blocks: 1740490
TreeView+ depends on / blocked
 
Reported: 2019-08-13 05:45 UTC by Dhananjay Arunesh
Modified: 2023-09-07 20:23 UTC (History)
3 users (show)

Fixed In Version: mgetty 1.2.1
Clone Of:
Environment:
Last Closed: 2021-10-27 10:51:20 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-08-13 05:45:59 UTC
A vulnerability was found in mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS , the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file.

Comment 1 Dhananjay Arunesh 2019-08-13 05:46:14 UTC
Created mgetty tracking bugs for this issue:

Affects: fedora-all [bug 1740488]

Comment 2 Dhananjay Arunesh 2019-08-13 05:48:19 UTC
External References:

https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/

Comment 3 Zdenek Dohnal 2019-08-13 06:34:28 UTC
IMO it is already recognized as vulnerability in https://bugzilla.redhat.com/show_bug.cgi?id=1629985 , so this is duplicate bug.

Comment 4 Zdenek Dohnal 2020-01-20 12:04:02 UTC
(In reply to Zdenek Dohnal from comment #3)
> IMO it is already recognized as vulnerability in
> https://bugzilla.redhat.com/show_bug.cgi?id=1629985 , so this is duplicate
> bug.

What do you think about it, Dhananjay?

Comment 7 Stefan Cornelius 2020-01-21 14:17:40 UTC
Patch:
https://bugzilla.redhat.com/attachment.cgi?id=1486347


Note You need to log in before you can comment on or make changes to this bug.