vulnerability
Ubuntu: (Multiple Advisories) (CVE-2026-22801): libpng vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:N/C:P/I:N/A:C) | Jan 12, 2026 | Jan 15, 2026 | Feb 13, 2026 |
Description
It was discovered that the libpng simplified API incorrectly processed
palette PNG images with partial transparency and gamma correction. If a
user or automated system were tricked into opening a specially crafted PNG
file, an attacker could use this issue to cause libpng to crash, resulting
in a denial of service. (CVE-2025-66293)
Petr Simecek, Stanislav Fort and Pavel Kohout discovered that the libpng
simplified API incorrectly processed interlaced 16-bit PNGs with 8-bit
output format and non-minimal row strides. If a user or automated system
were tricked into opening a specially crafted PNG file, an attacker could
use this issue to cause libpng to crash, resulting in a denial of service.
(CVE-2026-22695)
Cosmin Truta discovered that the libpng simplified API incorrectly handled
invalid row strides. If a user or automated system were tricked into
opening a specially crafted PNG file, an attacker could use this issue to
cause libpng to crash, resulting in a denial of service. (CVE-2026-22801)
Solutions
References
- CVE-2026-22801
- https://attackerkb.com/topics/CVE-2026-22801
- CWE-125
- CWE-190
- UBUNTU-USN-7963-1
- UBUNTU-USN-8035-1
- URL-https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8
- URL-https://ubuntu.com/security/notices/USN-7963-1
- URL-https://www.cve.org/CVERecord?id=CVE-2026-22801
- URL-https://www.openwall.com/lists/oss-security/2026/01/12/7
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.