DEBIAN-CVE-2025-64505
Advisory lineage Upstream: 1 Downstream: 2
Upstream
Downstream
Published: 25 Nov 2025, 00:15
Last modified:10 Dec 2025, 11:15
Vulnerability Summary
Overall Risk (default)
low
24/100 CVSS Score
6.1 MEDIUM
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
25 Nov 2025, 00:15
Published
Vulnerability first disclosed
10 Dec 2025, 11:15
Last Modified
Vulnerability information updated
Description
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
CVSS Metrics
- v3.1•MEDIUM•Score: 6.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
Affected Systems
- debian•libpng1.6
< 1.6.37-3+deb11u1 | < 1.6.39-2+deb12u1 | < 1.6.48-1+deb13u1 | < 1.6.51-1