DEBIAN-CVE-2026-33416

Source
https://security-tracker.debian.org/tracker/CVE-2026-33416
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33416.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-33416
Upstream
Published
2026-03-26T17:16:38.443Z
Modified
2026-03-27T10:02:52.556214Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, png_set_tRNS and png_set_PLTE each alias a heap-allocated buffer between png_struct and png_info, sharing a single allocation across two structs with independent lifetimes. The trans_alpha aliasing has been present since at least libpng 1.0, and the palette aliasing since at least 1.2.1. Both affect all prior release lines png_set_tRNS sets png_ptr->trans_alpha = info_ptr->trans_alpha (256-byte buffer) and png_set_PLTE sets info_ptr->palette = png_ptr->palette (768-byte buffer). In both cases, calling png_free_data (with PNG_FREE_TRNS or PNG_FREE_PLTE) frees the buffer through info_ptr while the corresponding png_ptr pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to png_set_tRNS or png_set_PLTE has the same effect, because both functions call png_free_data internally before reallocating the info_ptr buffer. Version 1.6.56 fixes the issue.

References

Affected packages

Debian:11 / libpng1.6

Package

Name
libpng1.6
Purl
pkg:deb/debian/libpng1.6?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.6.37-3
1.6.37-3+deb11u1
1.6.37-3+deb11u2
1.6.37-4
1.6.37-5
1.6.38-1
1.6.38-2
1.6.39-1
1.6.39-2
1.6.40-1
1.6.40-2
1.6.40-3
1.6.41-1
1.6.42-1
1.6.42-1.1~exp1
1.6.43-1
1.6.43-1exp1
1.6.43-2
1.6.43-3
1.6.43-4
1.6.43-5
1.6.44-1
1.6.44-2
1.6.44-3
1.6.45-1
1.6.46-1
1.6.46-2
1.6.46-3
1.6.46-4
1.6.47-1
1.6.47-1.1
1.6.48-1
1.6.49-1~exp1
1.6.50-1~exp1
1.6.50-1
1.6.51-1
1.6.52-1
1.6.53-1
1.6.54-1
1.6.55-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33416.json"

Debian:12 / libpng1.6

Package

Name
libpng1.6
Purl
pkg:deb/debian/libpng1.6?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.6.39-2
1.6.39-2+deb12u1
1.6.39-2+deb12u2
1.6.39-2+deb12u3
1.6.40-1
1.6.40-2
1.6.40-3
1.6.41-1
1.6.42-1
1.6.42-1.1~exp1
1.6.43-1
1.6.43-1exp1
1.6.43-2
1.6.43-3
1.6.43-4
1.6.43-5
1.6.44-1
1.6.44-2
1.6.44-3
1.6.45-1
1.6.46-1
1.6.46-2
1.6.46-3
1.6.46-4
1.6.47-1
1.6.47-1.1
1.6.48-1
1.6.49-1~exp1
1.6.50-1~exp1
1.6.50-1
1.6.51-1
1.6.52-1
1.6.53-1
1.6.54-1
1.6.55-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33416.json"

Debian:13 / libpng1.6

Package

Name
libpng1.6
Purl
pkg:deb/debian/libpng1.6?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.6.48-1
1.6.48-1+deb13u1
1.6.48-1+deb13u2
1.6.48-1+deb13u3
1.6.49-1~exp1
1.6.50-1~exp1
1.6.50-1
1.6.51-1
1.6.52-1
1.6.53-1
1.6.54-1
1.6.55-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33416.json"

Debian:14 / libpng1.6

Package

Name
libpng1.6
Purl
pkg:deb/debian/libpng1.6?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.6.48-1
1.6.49-1~exp1
1.6.50-1~exp1
1.6.50-1
1.6.51-1
1.6.52-1
1.6.53-1
1.6.54-1
1.6.55-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33416.json"