Bug 2428825 (CVE-2026-22695)
| Summary: | CVE-2026-22695 libpng: libpng: Denial of service and information disclosure via heap buffer over-read in png_image_finish_read | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | adudiak, ahughes, caswilli, fferrari, fitzsim, gotiwari, jgrulich, jhorak, kaycoth, khosford, kshier, mvyas, neugens, pjindal, stcannon, teagle, tpopela, yguenane |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in libpng, a reference library for processing PNG (Portable Network Graphics) image files. A local attacker could exploit a heap buffer over-read vulnerability in the `png_image_finish_read` function by tricking a user into processing a specially crafted interlaced 16-bit PNG file with an 8-bit output format and non-minimal row stride. This could lead to a denial of service (DoS) and potentially information disclosure.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
OSIDB Bzimport
2026-01-13 00:10:35 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:3405 https://access.redhat.com/errata/RHSA-2026:3405 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:3551 https://access.redhat.com/errata/RHSA-2026:3551 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2026:3573 https://access.redhat.com/errata/RHSA-2026:3573 This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:3577 https://access.redhat.com/errata/RHSA-2026:3577 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:3575 https://access.redhat.com/errata/RHSA-2026:3575 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:3574 https://access.redhat.com/errata/RHSA-2026:3574 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:3576 https://access.redhat.com/errata/RHSA-2026:3576 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:4306 https://access.redhat.com/errata/RHSA-2026:4306 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On Via RHSA-2026:4731 https://access.redhat.com/errata/RHSA-2026:4731 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2026:4732 https://access.redhat.com/errata/RHSA-2026:4732 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions Red Hat Enterprise Linux 8.8 Telecommunications Update Service Via RHSA-2026:4729 https://access.redhat.com/errata/RHSA-2026:4729 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2026:4730 https://access.redhat.com/errata/RHSA-2026:4730 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:4728 https://access.redhat.com/errata/RHSA-2026:4728 |