Description A vulnerability has been reported in OptiPNG, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a use-after-free error related to the palette reduction functionality. No further information is currently available. Success exploitation may allow execution of arbitrary code. The vulnerability is reported in version 0.7, 0.7.1, and 0.7.2. Solution Update to version 0.7.3.
+*optipng-0.7.3 (17 Sep 2012) + + 17 Sep 2012; Sebastian Pipping <sping@gentoo.org> +optipng-0.7.3.ebuild: + Bump to 0.7.3 (bug #435340) +
Arches, please test and mark stable: =media-gfx/optipng-0.7.3 Target KEYWORDS : "amd64 ppc ppc64 x86"
x86 done.
Tested amd64. Just for ebuild improvement, use "econf" instead of "./configure". Also, it calls gcc directly in "test phase", instead of x86_64-pc-linux-gnu-gcc.
(In reply to comment #4) > Tested amd64. > > Just for ebuild improvement, use "econf" instead of "./configure". > Also, it calls gcc directly in "test phase", instead of > x86_64-pc-linux-gnu-gcc. Forget about econf, it fails if you try to use it. ./configure --prefix=/usr --build=x86_64-pc-linux-gnu --host=x86_64-pc-linux-gnu --mandir=/usr/share/man --infodir=/usr/share/info --datadir=/usr/share --sysconfdir=/etc --localstatedir=/var/lib --libdir=/usr/lib64 -with-system-libpng -with-system-zlib --disable-silent-rules error: unknown option: --build=x86_64-pc-linux-gnu
Also, it calls ar and ranlib, instead of x86_64-pc-linux-gnu-ar and x86_64-pc-linux-gnu-ranlib.
amd64 stable
stable ppc ppc64
Thanks, everyone. New GLSA request filed. Maintainers, please drop vulnerable versions.
CVE-2012-4432 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4432): Use-after-free vulnerability in opngreduc.c in OptiPNG Hg and 0.7.x before 0.7.3 might allow remote attackers to execute arbitrary code via unspecified vectors related to "palette reduction."
22 Sep 2012; Agostino Sarubbo <ago@gentoo.org> -optipng-0.7.1.ebuild, -optipng-0.7.2.ebuild, -optipng-0.7.ebuild: Remove old vulnerable versions are removed.
This issue was resolved and addressed in GLSA 201404-03 at http://security.gentoo.org/glsa/glsa-201404-03.xml by GLSA coordinator Mikle Kolyada (Zlogene).