{"schema_version":"1.7.2","id":"OESA-2026-1127","modified":"2026-01-16T11:59:47Z","published":"2026-01-16T11:59:47Z","upstream":["CVE-2025-66293"],"summary":"libpng security update","details":"The libpng package contains libraries used by other programs for reading and writing PNG format files.\nThe PNG format was designed as a replacement for GIF and, to a lesser extent, TIFF,\nwith many improvements and extensions and lack of patent problems.\r\n\r\nSecurity Fix(es):\n\nLIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng&apos;s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng&apos;s internal state management. Upgrade to libpng 1.6.52 or later.(CVE-2025-66293)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"libpng","purl":"pkg:rpm/openEuler/libpng&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.40-4.oe2403"}]}],"ecosystem_specific":{"aarch64":["libpng-1.6.40-4.oe2403.aarch64.rpm","libpng-debuginfo-1.6.40-4.oe2403.aarch64.rpm","libpng-debugsource-1.6.40-4.oe2403.aarch64.rpm","libpng-devel-1.6.40-4.oe2403.aarch64.rpm","libpng-static-1.6.40-4.oe2403.aarch64.rpm","libpng-tools-1.6.40-4.oe2403.aarch64.rpm"],"noarch":["libpng-help-1.6.40-4.oe2403.noarch.rpm"],"src":["libpng-1.6.40-4.oe2403.src.rpm"],"x86_64":["libpng-1.6.40-4.oe2403.x86_64.rpm","libpng-debuginfo-1.6.40-4.oe2403.x86_64.rpm","libpng-debugsource-1.6.40-4.oe2403.x86_64.rpm","libpng-devel-1.6.40-4.oe2403.x86_64.rpm","libpng-static-1.6.40-4.oe2403.x86_64.rpm","libpng-tools-1.6.40-4.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1127"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-66293"}],"database_specific":{"severity":"High"}}
