CVE-2025-28162

NameCVE-2025-28162
DescriptionBuffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libpng1.6 (PTS)bullseye1.6.37-3vulnerable
bullseye (security)1.6.37-3+deb11u1vulnerable
bookworm, bookworm (security)1.6.39-2+deb12u1vulnerable
trixie (security), trixie1.6.48-1+deb13u1fixed
forky1.6.54-1fixed
sid1.6.55-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libpng1.6source(unstable)1.6.47-1unimportant

Notes

[bookworm] - libpng1.6 <no-dsa> (Minor issue)
[bullseye] - libpng1.6 <postponed> (Minor issue, memory leak)
https://github.com/pnggroup/libpng/issues/656
https://github.com/pnggroup/libpng/pull/657
Fixed by: https://github.com/pnggroup/libpng/commit/b20e6fb31479868f1d5f5cd268d4776767016941 (v1.6.47)
No security impact, memory leak in CLI tool

Search for package or bug name: Reporting problems