Out-of-bounds Read Affecting libpng package, versions <2:1.6.40-8.el10_1.2


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ORACLE10-LIBPNG-15370545
  • published4 Mar 2026
  • disclosed12 Jan 2026

Introduced: 12 Jan 2026

CVE-2026-22801  (opens in a new tab)
CWE-125  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade Oracle:10 libpng to version 2:1.6.40-8.el10_1.2 or higher.
This issue was patched in ELSA-2026-3551.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libpng package and not the libpng package as distributed by Oracle. See How to fix? for Oracle:10 relevant fixed versions and status.

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.

CVSS Base Scores

version 3.1