CVE-2016-5735

NameCVE-2016-5735
DescriptionInteger overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2257-1, DLA-966-1
Debian Bugs863469

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pngquant (PTS)buster2.12.2-1fixed
bullseye2.13.1-1fixed
bookworm2.17.0-1fixed
sid, trixie2.18.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pngquantsourcewheezy1.0-4.1+deb7u1DLA-966-1
pngquantsourcejessie2.3.0-1+deb8u1DLA-2257-1
pngquantsource(unstable)2.5.0-2863469

Notes

https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285

Search for package or bug name: Reporting problems