CVE-2026-34757
Description
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.0.9 to before 1.6.57, passing a pointer obtained from png_get_PLTE, png_get_tRNS, or png_get_hIST back into the corresponding setter on the same png_struct/png_info pair causes the setter to read from freed memory and copy its contents into the replacement buffer. The setter frees the internal buffer before copying from the caller-supplied pointer, which now dangles. The freed region may contain stale data (producing silently corrupted chunk metadata) or data from subsequent heap allocations (leaking unrelated heap contents into the chunk struct). This vulnerability is fixed in 1.6.57.
Affected products
3- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/pnggroup/libpng/commit/398cbe3df03f4e11bb031e07f416dfdde3684e8anvdPatch
- github.com/pnggroup/libpng/commit/55d20aaa322c9274491cda82c5cd4f99b48c6bccnvdPatch
- github.com/pnggroup/libpng/security/advisories/GHSA-6fr7-g8h7-v645nvdMitigationPatchVendor Advisory
- github.com/pnggroup/libpng/issues/836nvdExploitIssue TrackingMitigation
- github.com/pnggroup/libpng/issues/837nvdExploitIssue TrackingMitigation
- lists.debian.org/debian-lts-announce/2026/05/msg00017.htmlnvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.