DSA-3546-1 optipng -- security update

Related Vulnerabilities: CVE-2016-2191   CVE-2016-3981   CVE-2016-3982   CVE-2015-7801  

Hans Jerry Illikainen discovered that missing input sanitising in the BMP processing code of the optipng PNG optimiser may result in denial of service or the execution of arbitrary code if a malformed file is processed. For the oldstable distribution (wheezy), this problem has been fixed in version 0.6.4-1+deb7u2. This update also fixes CVE-2015-7801, which was originally targeted for a wheezy point update. For the stable distribution (jessie), this problem has been fixed in version 0.7.5-1+deb8u1. For the unstable distribution (sid), this problem will be fixed soon. We recommend that you upgrade your optipng packages.

Debian Security Advisory

DSA-3546-1 optipng -- security update

Date Reported:
07 Apr 2016
Affected Packages:
optipng
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2016-2191, CVE-2016-3981, CVE-2016-3982.
More information:

Hans Jerry Illikainen discovered that missing input sanitising in the BMP processing code of the optipng PNG optimiser may result in denial of service or the execution of arbitrary code if a malformed file is processed.

For the oldstable distribution (wheezy), this problem has been fixed in version 0.6.4-1+deb7u2. This update also fixes CVE-2015-7801, which was originally targeted for a wheezy point update.

For the stable distribution (jessie), this problem has been fixed in version 0.7.5-1+deb8u1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your optipng packages.