vulnerability
Ubuntu: (Multiple Advisories) (CVE-2025-64505): libpng vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:M/Au:N/C:P/I:N/A:C) | Nov 25, 2025 | Dec 12, 2025 | Mar 18, 2026 |
Severity
5
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:C)
Published
Nov 25, 2025
Added
Dec 12, 2025
Modified
Mar 18, 2026
Description
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
Solutions
ubuntu-pro-upgrade-libpng12-0ubuntu-pro-upgrade-libpng16-16ubuntu-pro-upgrade-libpng16-16t64
References
- CVE-2025-64505
- https://attackerkb.com/topics/CVE-2025-64505
- CWE-125
- UBUNTU-USN-7924-1
- UBUNTU-USN-8081-1
- URL-https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37
- URL-https://github.com/pnggroup/libpng/pull/748
- URL-https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42
- URL-https://ubuntu.com/security/notices/USN-7924-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-64505
- URL-https://www.openwall.com/lists/oss-security/2025/11/22/1
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.