Bug 2451819 (CVE-2026-33636) - CVE-2026-33636 libpng: libpng: Information disclosure and denial of service via out-of-bounds read/write in Neon palette expansion
Summary: CVE-2026-33636 libpng: libpng: Information disclosure and denial of service v...
Keywords:
Status: NEW
Alias: CVE-2026-33636
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2452107 2452108 2452110 2452111 2452112 2452113 2452114 2452115 2452116 2452117 2452118 2452120 2452121 2452122 2452123 2452124 2452125 2452128 2452129 2452130 2452131 2452133 2452119 2452132
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-26 18:03 UTC by OSIDB Bzimport
Modified: 2026-03-27 07:44 UTC (History)
18 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-26 18:03:16 UTC
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue.


Note You need to log in before you can comment on or make changes to this bug.