Libpng 1.6.51:修复了四个缓冲区溢出漏洞
Libpng 1.6.51: Four buffer overflow vulnerabilities fixed

原始链接: https://www.openwall.com/lists/oss-security/2025/11/22/1

## libpng 1.6.51 安全发布 libpng 库已更新至 1.6.51 版本,以解决 **四个缓冲区溢出漏洞** (CVE-2025-64505, CVE-2025-64506, CVE-2025-64720, CVE-2025-65018),影响版本 1.6.0 至 1.6.50。这些漏洞是通过模糊测试和安全研究发现的,研究人员包括 Samsung-PENTEST、weijinjinnihao 和 yosiimich。 其中两个 CVE 被评为 **高危** (CVE-2025-64720 & CVE-2025-65018),涉及潜在的越界读取和堆溢出,可能导致信息泄露、拒绝服务,以及在某些配置下,任意代码执行。另外两个是 **中危** (CVE-2025-64505 & CVE-2025-64506),涉及堆缓冲区读取越界。 所有漏洞都需要用户处理恶意构造的 PNG 文件。**强烈建议用户立即升级到 libpng 1.6.51** 以减轻这些风险。 更多详细信息,包括提交链接和 GitHub 安全公告,请访问:[https://github.com/pnggroup/libpng/releases/tag/v1.6.51](https://github.com/pnggroup/libpng/releases/tag/v1.6.51)

libpng图像库的最新更新(版本1.6.51)解决了四个缓冲区溢出漏洞。最初的报告表明,利用这些漏洞需要用户交互(打开恶意PNG文件),但Hacker News上的评论员对此表示异议,指出PNG文件经常被网络浏览器、通知和图像生成工具自动处理,无需用户明确同意。 在像libpng这样成熟的库中发现这些漏洞——包括两个高危问题——凸显了软件安全面临的持续挑战。值得注意的是,Google Chrome正在放弃libpng,转而使用内部Skia模块,该模块利用Rust(本身利用`png` crate)进行PNG解码和编码。此次更新影响的版本可追溯到2013年。
相关文章

原文
oss-security - libpng 1.6.51: Four buffer overflow vulnerabilities fixed: CVE-2025-64505, CVE-2025-64506, CVE-2025-64720, CVE-2025-65018 [<prev] [day] [month] [year] [list]
Message-ID: <CAAoVtZw-pkvsSTaXAHjDdUC3NRDwvwVNT8D4BpO5z3d79W-FVg@mail.gmail.com>
Date: Sat, 22 Nov 2025 03:27:35 +0200
From: Cosmin Truta <[email protected]>
To: [email protected]
Subject: libpng 1.6.51: Four buffer overflow vulnerabilities fixed:
 CVE-2025-64505, CVE-2025-64506, CVE-2025-64720, CVE-2025-65018

Hello, everyone,

libpng 1.6.51 has been released to address four buffer overflow
vulnerabilities discovered through fuzzing and security research.
This release fixes two high-severity and two moderate-severity CVEs
affecting libpng 1.6.0 through 1.6.50.

CVE-2025-64505 (CVSS 6.1, Moderate): Heap buffer over-read in
png_do_quantize via malformed palette index.

CVE-2025-64506 (CVSS 6.1, Moderate): Heap buffer over-read in
png_write_image_8bit with 8-bit input and convert_to_8bit enabled.

CVE-2025-64720 (CVSS 7.1, High): Out-of-bounds read in
png_image_read_composite via palette premultiplication with
PNG_FLAG_OPTIMIZE_ALPHA.

CVE-2025-65018 (CVSS 7.1, High): Heap buffer overflow in
png_combine_row triggered via png_image_finish_read when processing
16-bit interlaced PNGs with 8-bit output format.

All vulnerabilities require user interaction (processing a malicious
PNG file) and can result in information disclosure and/or denial of
service. CVE-2025-65018 may enable arbitrary code execution via heap
corruption in certain heap configurations.

GitHub Security Advisories:
- CVE-2025-64505:
https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42
- CVE-2025-64506:
https://github.com/pnggroup/libpng/security/advisories/GHSA-qpr4-xm66-hww6
- CVE-2025-64720:
https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww
- CVE-2025-65018:
https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g

Fixes:
- CVE-2025-64505:
https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37
- CVE-2025-64506:
https://github.com/pnggroup/libpng/commit/2bd84c019c300b78e811743fbcddb67c9d9bf821
- CVE-2025-64720:
https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643
- CVE-2025-65018:
https://github.com/pnggroup/libpng/commit/16b5e3823918840aae65c0a6da57c78a5a496a4d

https://github.com/pnggroup/libpng/commit/218612ddd6b17944e21eda56caf8b4bf7779d1ea

Note: CVE-2025-65018 requires both commits for correct remediation.

Release: https://github.com/pnggroup/libpng/releases/tag/v1.6.51

Credit: Samsung-PENTEST (CVE-2025-64505, CVE-2025-64506, CVE-2025-64720),
weijinjinnihao (CVE-2025-64506), yosiimich (CVE-2025-65018), with analysis
by Fabio Gritti and John Bowler.

Users should upgrade to libpng 1.6.51 immediately.

Cosmin Truta
libpng maintainer

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.

联系我们 contact @ memedata.com