Описание
Security update for libpng16
This update for libpng16 fixes the following issues:
- CVE-2025-64505: heap buffer over-read in
png_do_quantizewhen processing PNG files malformed palette indices (bsc#1254157). - CVE-2025-64506: heap buffer over-read in
png_write_image_8bitwhen processing 8-bit input withconvert_to_8bitenabled (bsc#1254158). - CVE-2025-64720: out-of-bounds read in
png_image_read_compositewhen processing palette images withPNG_FLAG_OPTIMIZE_ALPHAenabled (bsc#1254159). - CVE-2025-65018: heap buffer overflow in
png_image_finish_readwhen processing specially crafted 16-bit interlaced PNGs with 8-bit output format (bsc#1254160). - CVE-2025-66293: out-of-bounds read of the
png_sRGB_basearray when processing palette PNG images with partial transparency and gamma correction (bsc#1254480).
Список пакетов
openSUSE Leap 16.0
Ссылки
- SUSE Security Ratings
- SUSE Bug 1254157
- SUSE Bug 1254158
- SUSE Bug 1254159
- SUSE Bug 1254160
- SUSE Bug 1254480
- SUSE CVE CVE-2025-64505 page
- SUSE CVE CVE-2025-64506 page
- SUSE CVE CVE-2025-64720 page
- SUSE CVE CVE-2025-65018 page
- SUSE CVE CVE-2025-66293 page
Описание
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
Затронутые продукты
Ссылки
- CVE-2025-64505
- SUSE Bug 1254157
Описание
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.
Затронутые продукты
Ссылки
- CVE-2025-64506
- SUSE Bug 1254158
Описание
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
Затронутые продукты
Ссылки
- CVE-2025-64720
- SUSE Bug 1254159
Описание
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
Затронутые продукты
Ссылки
- CVE-2025-65018
- SUSE Bug 1254160
Описание
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.
Затронутые продукты
Ссылки
- CVE-2025-66293
- SUSE Bug 1254480