Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-64505

Опубликовано: 25 нояб. 2025
Источник: debian
EPSS Низкий

Описание

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libpng1.6fixed1.6.51-1package

Примечания

  • https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42

  • https://github.com/pnggroup/libpng/pull/748

  • https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37 (v1.6.51)

  • https://www.openwall.com/lists/oss-security/2025/11/22/1

EPSS

Процентиль: 1%
0.00012
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
27 дней назад

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.

CVSS3: 6.1
nvd
27 дней назад

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.

CVSS3: 6.1
msrc
18 дней назад

LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index

suse-cvrf
4 дня назад

Security update for libpng12

suse-cvrf
9 дней назад

Security update for libpng12

EPSS

Процентиль: 1%
0.00012
Низкий