Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 17 Sep 2012 18:36:25 +0200
From: Agostino Sarubbo <>
Subject: CVE request: OptiPNG Palette Reduction Use-After-Free Vulnerability

Quoting the secunia advisory:

A vulnerability has been reported in OptiPNG, which can be exploited by 
malicious people to potentially compromise a user's system.

The vulnerability is caused due to a use-after-free error related to the 
palette reduction functionality. No further information is currently 

Success exploitation may allow execution of arbitrary code.

The vulnerability is reported in version 0.7, 0.7.1, and 0.7.2.

Update to version 0.7.3.

Code commit:

Additional info:
Version 0.6.5 and earlier are not affected.
Agostino Sarubbo / ago -at-
Gentoo/AMD64 Arch Security Liaison
[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ