Bug 2416905 (CVE-2025-64505)

Summary: CVE-2025-64505 libpng: LIBPNG heap buffer overflow via malformed palette index
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adudiak, ahughes, caswilli, crizzo, fferrari, fitzsim, gotiwari, gtanzill, jbuscemi, jgrulich, jhorak, kaycoth, khosford, kshier, mvyas, neugens, pjindal, stcannon, teagle, tpopela, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2418394, 2418395, 2418397, 2418398, 2418400, 2418401, 2418402, 2418403, 2418405, 2418406, 2418407, 2418408, 2418409, 2418411, 2418412, 2418416, 2418417, 2418418, 2418419, 2418420, 2418421, 2418422, 2418423, 2418424, 2418396, 2418399, 2418404, 2418410, 2418413, 2418414, 2418415, 2418425, 2418426, 2418427    
Bug Blocks:    

Description OSIDB Bzimport 2025-11-25 00:01:24 UTC
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.