Your message dated Sat, 21 Feb 2026 20:07:33 +0000
with message-id <[email protected]>
and subject line Bug#1125444: fixed in libpng1.6 1.6.39-2+deb12u2
has caused the Debian Bug report #1125444,
regarding libpng1.6: CVE-2026-22801: Integer truncation causing heap buffer 
over-read in png_image_write_*
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1125444: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125444
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libpng1.6
Version: 1.6.53-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 1.6.26-1

Hi,

The following vulnerability was published for libpng1.6.

CVE-2026-22801[0]:
| LIBPNG is a reference library for use in applications that read,
| create, and manipulate PNG (Portable Network Graphics) raster image
| files. From 1.6.26 to 1.6.53, there is an integer truncation in the
| libpng simplified write API functions png_write_image_16bit and
| png_write_image_8bit causes heap buffer over-read when the caller
| provides a negative row stride (for bottom-up image layouts) or a
| stride exceeding 65535 bytes. The bug was introduced in libpng
| 1.6.26 (October 2016) by casts added to silence compiler warnings on
| 16-bit systems. This vulnerability is fixed in 1.6.54.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-22801
    https://www.cve.org/CVERecord?id=CVE-2026-22801
[1] https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: libpng1.6
Source-Version: 1.6.39-2+deb12u2
Done: Tobias Frost <[email protected]>

We believe that the bug you reported is fixed in the latest version of
libpng1.6, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tobias Frost <[email protected]> (supplier of updated libpng1.6 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 24 Jan 2026 14:15:14 +0100
Source: libpng1.6
Architecture: source
Version: 1.6.39-2+deb12u2
Distribution: bookworm
Urgency: medium
Maintainer: Maintainers of libpng1.6 packages <[email protected]>
Changed-By: Tobias Frost <[email protected]>
Closes: 1125443 1125444
Changes:
 libpng1.6 (1.6.39-2+deb12u2) bookworm; urgency=medium
 .
   * Backporting fixes from 1.6.54 for oldstable:
     - CVE-2026-22801 - Heap buffer over-read (Closes: #1125444
     - CVE-2026-22695 - Heap buffer over-read (Closes: #1125443)
Checksums-Sha1:
 94837b7c64dcccdd356e16a817b3cf13902f038a 2292 libpng1.6_1.6.39-2+deb12u2.dsc
 d384c4526a84d213f697108258c490adc99b4cdb 1519415 libpng1.6_1.6.39.orig.tar.gz
 4284ce1db920f382b975fb7cfa4c229aeef91669 39264 
libpng1.6_1.6.39-2+deb12u2.debian.tar.xz
 7b30dcfd1325f2061698946367099298e931d143 6414 
libpng1.6_1.6.39-2+deb12u2_source.buildinfo
Checksums-Sha256:
 b81c868c9751efc4df4b1616f3003c3e32471f572dbedebd53f9c14816152ca6 2292 
libpng1.6_1.6.39-2+deb12u2.dsc
 a00e9d2f2f664186e4202db9299397f851aea71b36a35e74910b8820e380d441 1519415 
libpng1.6_1.6.39.orig.tar.gz
 05d884b8ea70371a2e013b290caf793c1d46c2005462b0d29e3e18e7d7aa3e23 39264 
libpng1.6_1.6.39-2+deb12u2.debian.tar.xz
 cb624182a1d16accf65735f5280df89723ee0c9210cd2b31602d04ce13ad0ab5 6414 
libpng1.6_1.6.39-2+deb12u2_source.buildinfo
Files:
 f143f5a8d81c15a6cdd79cd5edd2ff38 2292 libs optional 
libpng1.6_1.6.39-2+deb12u2.dsc
 a704977d681a40d8223d8b957fd41b29 1519415 libs optional 
libpng1.6_1.6.39.orig.tar.gz
 1ab6982917fdff6f9f28e32a4f52295b 39264 libs optional 
libpng1.6_1.6.39-2+deb12u2.debian.tar.xz
 6b276d0badfe12f72bb6997bcd006515 6414 libs optional 
libpng1.6_1.6.39-2+deb12u2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=o3FD
-----END PGP SIGNATURE-----

Attachment: pgpCXAMLcLI12.pgp
Description: PGP signature


--- End Message ---

Reply via email to