Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file. External references, including reproducer and patch: https://sourceforge.net/p/optipng/bugs/56/
Created optipng tracking bugs for this issue: Affects: fedora-all [bug 1327221] Affects: epel-all [bug 1327222]
Patch is merged with CVE-2016-2191, presented as a set of 2 patches : -> https://sourceforge.net/p/optipng/bugs/56/#5168 -> https://sourceforge.net/p/optipng/bugs/56/#d6e6
Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.