See secunia advisory: http://secunia.com/Advisories/32651/ We already have 0.6.2 in the tree, so we only need to stabilize it, arch's cc'ed.
Arches, please test and stabilize: =media-gfx/optipng-0.6.2 Target keywords: alpha amd64 ppc x86
amd64/x86 stable
alpha stable
ppc stable
CVE-2008-5101 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5101): Buffer overflow in the BMP reader in OptiPNG 0.6 and 0.6.1 allows user-assisted attackers to execute arbitrary code via a crafted BMP image, related to an "array overflow."
GLSA request filed.
GLSA 200812-01