Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4396-1 | libpng1.6 security update |
Debian DSA |
DSA-6076-1 | libpng1.6 security update |
Ubuntu USN |
USN-7924-1 | libpng vulnerabilities |
Thu, 27 Nov 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 26 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* |
Wed, 26 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libpng
Libpng libpng |
|
| Vendors & Products |
Libpng
Libpng libpng |
Tue, 25 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51. | |
| Title | LIBPNG is vulnerable to a heap buffer over-read in `png_write_image_8bit` with grayscale+alpha or RGB/RGBA images | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-25T19:27:04.161Z
Reserved: 2025-11-05T21:15:39.399Z
Link: CVE-2025-64506
Updated: 2025-11-25T19:27:00.043Z
Status : Analyzed
Published: 2025-11-25T00:15:47.300
Modified: 2025-11-26T18:34:38.240
Link: CVE-2025-64506
OpenCVE Enrichment
Updated: 2025-11-26T11:10:50Z
Debian DLA
Debian DSA
Ubuntu USN