Source: libpng1.6
Version: 1.6.55-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libpng1.6.

CVE-2026-33636[0]:
| LIBPNG is a reference library for use in applications that read,
| create, and manipulate PNG (Portable Network Graphics) raster image
| files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and
| write exists in libpng's ARM/AArch64 Neon-optimized palette
| expansion path. When expanding 8-bit paletted rows to RGB or RGBA,
| the Neon loop processes a final partial chunk without verifying that
| enough input pixels remain. Because the implementation works
| backward from the end of the row, the final iteration dereferences
| pointers before the start of the row buffer (OOB read) and writes
| expanded pixel data to the same underflowed positions (OOB write).
| This is reachable via normal decoding of attacker-controlled PNG
| input if Neon is enabled. Version 1.6.56 fixes the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33636
    https://www.cve.org/CVERecord?id=CVE-2026-33636
[1] 
https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to