Out-of-bounds Read Affecting libpng package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CONAN-LIBPNG-15849595
  • published30 Mar 2026
  • disclosed26 Mar 2026
  • creditAmemoyoi

Introduced: 26 Mar 2026

NewCVE-2026-33636  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

There is no fixed version for libpng.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read through the NEON palette expansion functions in arm/palette_neon_intrinsics.c. An attacker can corrupt memory or crash the application by supplying a PNG row whose width is not a multiple of the NEON chunk size.

Notes

  • The vulnerable code advanced in fixed-size chunks without stopping before the final partial chunk, so the NEON path could overrun the row buffer before handing control to the scalar fallback.
  • This is only exploitable if build targets ARM/AArch64 with Neon enabled

CVSS Base Scores

version 4.0
version 3.1