Update

USN-7963-1: libpng vulnerabilities

USN-7963-1: libpng vulnerabilities

Publication date: 14 January 2026
Overview: Several security issues were fixed in libpng.

Packages
libpng1.6 - PNG (Portable Network Graphics) file library

Details
It was discovered that the libpng simplified API incorrectly processed
palette PNG images with partial transparency and gamma correction. If a
user or automated system were tricked into opening a specially crafted PNG
file, an attacker could use this issue to cause libpng to crash, resulting
in a denial of service. (CVE-2025-66293)

Petr Simecek, Stanislav Fort and Pavel Kohout discovered that the libpng
simplified API incorrectly processed interlaced 16-bit PNGs with 8-bit
output format and non-minimal row strides. If a user or automated system
were tricked into opening a specially crafted PNG file, an attacker could
use this issue to cause libpng to crash, resulting in a denial of service.
(CVE-2026-22695)

Cosmin Truta discovered that the libpng simplified API incorrectly handled
invalid row strides. If a user or automated system were tricked into
opening a specially crafted PNG file, an attacker could use this issue to
cause libpng to crash, resulting in a denial of service. (CVE-2026-22801)

Update instructions
In general, a standard system update will make all the necessary changes.

The problem can be corrected by updating your system to the following package versions:

  • 25.10 questing libpng16-16t64 – 1.6.50-1ubuntu0.3
  • 25.04 plucky libpng16-16t64 – 1.6.47-1.1ubuntu0.3
  • 24.04 LTS noble libpng16-16t64 – 1.6.43-5ubuntu0.3
  • 22.04 LTS jammy libpng16-16 – 1.6.37-3ubuntu0.3
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad