A global buffer overflow in OptiPNG 0.7.6 allows remote attackers to cause a denial-of-service attack with a maliciously crafted GIF format file, related to an uncontrolled loop in the LZWReadByte function of the gifread.c file. References: https://nvd.nist.gov/vuln/detail/CVE-2017-16938 https://bugs.debian.org/878839 https://bugs.gentoo.org/639690 https://bugs.mageia.org/show_bug.cgi?id=22099 https://bugzilla.suse.com/show_bug.cgi?id=1069774 https://sourceforge.net/p/optipng/bugs/69/ https://sourceforge.net/p/optipng/bugs/_discuss/thread/10e27bff/63db/attachment/optipng-076-sfbug-69.patch
Created optipng tracking bugs for this issue: Affects: fedora-all [bug 1520230]
Statement: Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.