{"id":"CVE-2019-1010190","details":"mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.","modified":"2026-03-14T09:30:46.745897Z","published":"2019-07-24T13:15:11.073Z","related":["SUSE-SU-2020:0853-1","SUSE-SU-2020:0957-1","openSUSE-SU-2020:0506-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00016.html"},{"type":"ADVISORY","url":"https://www.x41-dsec.de/lab/advisories/x41-2018-007-mgetty/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"1.2.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1010190.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}