Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestion detail

Untriaged
Permalink CVE-2026-3713
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month ago
pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

libpng
  • ==1.6.18
  • ==1.6.1
  • ==1.6.22
  • ==1.6.16
  • ==1.6.5
  • ==1.6.30
  • ==1.6.21
  • ==1.6.27
  • ==1.6.35
  • ==1.6.43
  • ==1.6.38
  • ==1.6.39
  • ==1.6.51
  • ==1.6.14
  • ==1.6.48
  • ==1.6.7
  • ==1.6.13
  • ==1.6.52
  • ==1.6.54
  • ==1.6.50
  • ==1.6.40
  • ==1.6.55
  • ==1.6.9
  • ==1.6.46
  • ==1.6.10
  • ==1.6.53
  • ==1.6.4
  • ==1.6.12
  • ==1.6.34
  • ==1.6.3
  • ==1.6.20
  • ==1.6.31
  • ==1.6.45
  • ==1.6.26
  • ==1.6.33
  • ==1.6.11
  • ==1.6.49
  • ==1.6.19
  • ==1.6.47
  • ==1.6.23
  • ==1.6.6
  • ==1.6.29
  • ==1.6.32
  • ==1.6.36
  • ==1.6.24
  • ==1.6.41
  • ==1.6.37
  • ==1.6.0
  • ==1.6.8
  • ==1.6.44
  • ==1.6.42
  • ==1.6.17
  • ==1.6.25
  • ==1.6.15
  • ==1.6.28
  • ==1.6.2

Matching in nixpkgs

pkgs.libpng

Official reference implementation for the PNG file format with animation patch

Package maintainers