diff options
| author | Fernando ApesteguĂa <fernape@FreeBSD.org> | 2025-11-27 17:43:55 +0100 |
|---|---|---|
| committer | Fernando ApesteguĂa <fernape@FreeBSD.org> | 2025-11-27 17:43:55 +0100 |
| commit | 28c9d484c33a547c31592b0f7cdf4345f338eccf (patch) | |
| tree | e25cc9948ed2bdc57f213e95cb5fcb5759c49e18 | |
| parent | net-mgmt/wifimgr: Update 1.25 => 1.26 (diff) | |
security/vuxml: Add png vulnerabilities
* CVE-2025-65018
* CVE-2025-64720
* CVE-2025-64506
* CVE-2025-64505
Reported by: Stefan Grundmann <sg2342@googlemail.com>
| -rw-r--r-- | security/vuxml/vuln/2025.xml | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 9c9781632672..faa989abdbd9 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,69 @@ + <vuln vid="4b297f5a-cbad-11f0-ac9f-b42e991fc52e"> + <topic>png -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>png</name> + <range><lt>1.6.51</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g reports:</p> + <blockquote cite="https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g"> + <p>LIBPNG is a reference library for use in applications + that read, create, and manipulate PNG (Portable Network + Graphics) raster image files. + </p> + <ul> + <li>From version 1.6.0 to before 1.6.51, there is a heap + buffer overflow vulnerability in the libpng simplified API + function png_image_finish_read when processing 16-bit + interlaced PNGs with 8-bit output format. Attacker-crafted + interlaced PNG files cause heap writes beyond allocated + buffer bounds. This issue has been patched in version + 1.6.51.</li> + <li>From version 1.6.0 to before 1.6.51, an out-of-bounds read + vulnerability exists in png_image_read_composite when + processing palette images with PNG_FLAG_OPTIMIZE_ALPHA + enabled. The palette compositing code in + png_init_read_transformations incorrectly applies background + compositing during premultiplication, violating the invariant + component alpha 257 required by the simplified PNG API.</li> + <li>From version 1.6.0 to before 1.6.51, a heap buffer over-read + vulnerability exists in libpng's png_write_image_8bit function + when processing 8-bit images through the simplified write API + with convert_to_8bit enabled. The vulnerability affects 8-bit + grayscale+alpha, RGB/RGBA, and images with incomplete row data. + A conditional guard incorrectly allows 8-bit input to enter code + expecting 16-bit input, causing reads up to 2 bytes beyond + allocated buffer boundaries.</li> + <li>Prior to version 1.6.51, a heap buffer over-read vulnerability + exists in libpng's png_do_quantize function when processing PNG + files with malformed palette indices. The vulnerability occurs + when palette_lookup array bounds are not validated against + externally-supplied image data, allowing an attacker to craft a + PNG file with out-of-range palette indices that trigger + out-of-bounds memory access.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-65018</cvename> + <url>https://cveawg.mitre.org/api/cve/CVE-2025-65018</url> + <cvename>CVE-2025-64720</cvename> + <url>https://cveawg.mitre.org/api/cve/CVE-2025-64720</url> + <cvename>CVE-2025-64506</cvename> + <url>https://cveawg.mitre.org/api/cve/CVE-2025-64506</url> + <cvename>CVE-2025-64505</cvename> + <url>https://cveawg.mitre.org/api/cve/CVE-2025-64505</url> + </references> + <dates> + <discovery>2025-11-24</discovery> + <entry>2025-11-27</entry> + </dates> + </vuln> + <vuln vid="4530fc9f-cb47-11f0-85d8-2cf05da270f3"> <topic>Gitlab -- vulnerabilities</topic> <affects> |
