Source: libpng1.6
Version: 1.6.51-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/pnggroup/libpng/issues/778
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 1.6.39-2+deb12u1
Control: found -1 1.6.48-1+deb13u1

Hi,

The following vulnerability was published for libpng1.6.

CVE-2026-22695[0]:
| LIBPNG is a reference library for use in applications that read,
| create, and manipulate PNG (Portable Network Graphics) raster image
| files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in
| the libpng simplified API function png_image_finish_read when
| processing interlaced 16-bit PNGs with 8-bit output format and non-
| minimal row stride. This is a regression introduced by the fix for
| CVE-2025-65018. This vulnerability is fixed in 1.6.54.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-22695
    https://www.cve.org/CVERecord?id=CVE-2026-22695
[1] https://github.com/pnggroup/libpng/issues/778
[2] https://github.com/pnggroup/libpng/security/advisories/GHSA-mmq5-27w3-rxpp
[3] 
https://github.com/pnggroup/libpng/commit/e4f7ad4ea2a471776c81dda4846b7691925d9786

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to