OESA-2021-1288

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1288
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1288.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2021-1288
Upstream
Published
2021-07-31T11:03:05Z
Modified
2025-09-03T06:16:45.888259Z
Summary
optipng security update
Details

Security Fix(es):

Off-by-one error in the bmprle4fread function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file, which triggers a heap-based buffer overflow.(CVE-2016-3982)

Heap-based buffer overflow in the bmpreadrows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.(CVE-2016-3981)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP2 / optipng

Package

Name
optipng
Purl
pkg:rpm/openEuler/optipng&distro=openEuler-20.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.7.7-1.oe1

Ecosystem specific

{
    "x86_64": [
        "optipng-debuginfo-0.7.7-1.oe1.x86_64.rpm",
        "optipng-debugsource-0.7.7-1.oe1.x86_64.rpm",
        "optipng-0.7.7-1.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "optipng-0.7.7-1.oe1.aarch64.rpm",
        "optipng-debugsource-0.7.7-1.oe1.aarch64.rpm",
        "optipng-debuginfo-0.7.7-1.oe1.aarch64.rpm"
    ],
    "src": [
        "optipng-0.7.7-1.oe1.src.rpm"
    ]
}