UBUNTU-CVE-2026-3713

Source
https://ubuntu.com/security/CVE-2026-3713
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-3713.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-3713
Upstream
Published
2026-03-08T06:16:00Z
Modified
2026-03-13T18:08:49.483157Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • 1.9 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

References

Affected packages

Ubuntu:Pro:14.04:LTS / libpng

Package

Name
libpng
Purl
pkg:deb/ubuntu/libpng@1.2.50-1ubuntu2.14.04.3+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.2.49-4ubuntu1
1.2.49-5ubuntu1
1.2.50-1ubuntu1
1.2.50-1ubuntu2
1.2.50-1ubuntu2.14.04.1
1.2.50-1ubuntu2.14.04.2
1.2.50-1ubuntu2.14.04.3
1.2.50-1ubuntu2.14.04.3+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.2.50-1ubuntu2.14.04.3+esm1",
            "binary_name": "libpng12-0"
        },
        {
            "binary_version": "1.2.50-1ubuntu2.14.04.3+esm1",
            "binary_name": "libpng12-dev"
        },
        {
            "binary_version": "1.2.50-1ubuntu2.14.04.3+esm1",
            "binary_name": "libpng3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-3713.json"