Your message dated Sat, 21 Feb 2026 20:07:33 +0000
with message-id <[email protected]>
and subject line Bug#1125443: fixed in libpng1.6 1.6.39-2+deb12u2
has caused the Debian Bug report #1125443,
regarding libpng1.6: CVE-2026-22695: Heap buffer over-read in
png_image_read_direct_scaled()
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1125443: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125443
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libpng1.6
Version: 1.6.51-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/pnggroup/libpng/issues/778
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 1.6.39-2+deb12u1
Control: found -1 1.6.48-1+deb13u1
Hi,
The following vulnerability was published for libpng1.6.
CVE-2026-22695[0]:
| LIBPNG is a reference library for use in applications that read,
| create, and manipulate PNG (Portable Network Graphics) raster image
| files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in
| the libpng simplified API function png_image_finish_read when
| processing interlaced 16-bit PNGs with 8-bit output format and non-
| minimal row stride. This is a regression introduced by the fix for
| CVE-2025-65018. This vulnerability is fixed in 1.6.54.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2026-22695
https://www.cve.org/CVERecord?id=CVE-2026-22695
[1] https://github.com/pnggroup/libpng/issues/778
[2] https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp
[3]
https://github.com/pnggroup/libpng/commit/e4f7ad4ea2a471776c81dda4846b7691925d9786
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: libpng1.6
Source-Version: 1.6.39-2+deb12u2
Done: Tobias Frost <[email protected]>
We believe that the bug you reported is fixed in the latest version of
libpng1.6, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Tobias Frost <[email protected]> (supplier of updated libpng1.6 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 24 Jan 2026 14:15:14 +0100
Source: libpng1.6
Architecture: source
Version: 1.6.39-2+deb12u2
Distribution: bookworm
Urgency: medium
Maintainer: Maintainers of libpng1.6 packages <[email protected]>
Changed-By: Tobias Frost <[email protected]>
Closes: 1125443 1125444
Changes:
libpng1.6 (1.6.39-2+deb12u2) bookworm; urgency=medium
.
* Backporting fixes from 1.6.54 for oldstable:
- CVE-2026-22801 - Heap buffer over-read (Closes: #1125444
- CVE-2026-22695 - Heap buffer over-read (Closes: #1125443)
Checksums-Sha1:
94837b7c64dcccdd356e16a817b3cf13902f038a 2292 libpng1.6_1.6.39-2+deb12u2.dsc
d384c4526a84d213f697108258c490adc99b4cdb 1519415 libpng1.6_1.6.39.orig.tar.gz
4284ce1db920f382b975fb7cfa4c229aeef91669 39264
libpng1.6_1.6.39-2+deb12u2.debian.tar.xz
7b30dcfd1325f2061698946367099298e931d143 6414
libpng1.6_1.6.39-2+deb12u2_source.buildinfo
Checksums-Sha256:
b81c868c9751efc4df4b1616f3003c3e32471f572dbedebd53f9c14816152ca6 2292
libpng1.6_1.6.39-2+deb12u2.dsc
a00e9d2f2f664186e4202db9299397f851aea71b36a35e74910b8820e380d441 1519415
libpng1.6_1.6.39.orig.tar.gz
05d884b8ea70371a2e013b290caf793c1d46c2005462b0d29e3e18e7d7aa3e23 39264
libpng1.6_1.6.39-2+deb12u2.debian.tar.xz
cb624182a1d16accf65735f5280df89723ee0c9210cd2b31602d04ce13ad0ab5 6414
libpng1.6_1.6.39-2+deb12u2_source.buildinfo
Files:
f143f5a8d81c15a6cdd79cd5edd2ff38 2292 libs optional
libpng1.6_1.6.39-2+deb12u2.dsc
a704977d681a40d8223d8b957fd41b29 1519415 libs optional
libpng1.6_1.6.39.orig.tar.gz
1ab6982917fdff6f9f28e32a4f52295b 39264 libs optional
libpng1.6_1.6.39-2+deb12u2.debian.tar.xz
6b276d0badfe12f72bb6997bcd006515 6414 libs optional
libpng1.6_1.6.39-2+deb12u2_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=o3FD
-----END PGP SIGNATURE-----
pgpFOE2hDIC0j.pgp
Description: PGP signature
--- End Message ---