CVE-2025-65018
Linux Debian Schwachstellenanalyse und -minderung

Überblick

CVE-2025-65018 is a heap buffer overflow vulnerability discovered in libpng versions 1.6.0 through 1.6.50. The vulnerability affects the libpng simplified API function pngimagefinish_read when processing 16-bit interlaced PNGs with 8-bit output format. The issue was discovered by security researcher yosiimich and was patched in libpng version 1.6.51, released on November 22, 2025 (Openwall List, GitHub Advisory).

Technische Details

The vulnerability occurs when processing interlaced PNG images where the PNG header (IHDR) declares 16-bit color depth with Adam7 interlacing, while the application requests 8-bit output format. During interlaced image processing, the pngcombinerow function writes using 16-bit IHDR depth before transformation, causing writes beyond the buffer allocated via PNGIMAGESIZE(image). For example, with a 32×32 pixel image, when the input format is 16 bits/channel × 3 channels = 6144 bytes, but the output buffer is allocated for 8 bits/channel × 4 channels = 4096 bytes, this results in a 2048-byte overflow. The vulnerability has been assigned a CVSS score of 7.1 (High) (GitHub Advisory).

Aufprall

The vulnerability can lead to heap corruption with potential consequences including arbitrary code execution through heap metadata corruption, and denial of service through deterministic crashes. The impact is more severe with larger images - for example, a 256×256 pixel image can cause an overflow of 131,072 bytes (GitHub Advisory).

Risikominderung und Problemumgehungen

The vulnerability was fixed in libpng version 1.6.51 through two consecutive commits. The final fix introduced an intermediate buffer specifically for the 16-to-8 bit conversion of interlaced images, while maintaining the fast path for non-interlaced images. Users are strongly advised to upgrade to libpng 1.6.51 or later. For those unable to upgrade immediately, a temporary workaround involves forcing 16-bit output format for interlaced 16-bit PNGs, though this is not officially supported and may break in future versions (GitHub Advisory, Openwall List).

Zusätzliche Ressourcen


QuelleDieser Bericht wurde mithilfe von KI erstellt

Verwandt Linux Debian Schwachstellen:

CVE-Kennung

Strenge

Punktzahl

Technologieen

Name der Komponente

CISA KEV-Exploit

Hat fix

Veröffentlichungsdatum

CVE-2025-65018HIGH7.1
  • Linux DebianLinux Debian
  • libpng1.6
NeinJaNov 25, 2025
CVE-2025-64720HIGH7.1
  • Linux DebianLinux Debian
  • libpng1.6
NeinJaNov 25, 2025
CVE-2025-64506MEDIUM6.1
  • Linux DebianLinux Debian
  • libpng1.6
NeinJaNov 25, 2025
CVE-2025-64505MEDIUM6.1
  • Linux DebianLinux Debian
  • libpng
NeinJaNov 25, 2025
CVE-2025-13466MEDIUM5.5
  • Linux DebianLinux Debian
  • node-body-parser
NeinNeinNov 24, 2025

Kostenlose Schwachstellenbewertung

Benchmarking Ihrer Cloud-Sicherheitslage

Bewerten Sie Ihre Cloud-Sicherheitspraktiken in 9 Sicherheitsbereichen, um Ihr Risikoniveau zu bewerten und Lücken in Ihren Abwehrmaßnahmen zu identifizieren.

Bewertung anfordern

Eine personalisierte Demo anfordern

Sind Sie bereit, Wiz in Aktion zu sehen?

"Die beste Benutzererfahrung, die ich je gesehen habe, bietet vollständige Transparenz für Cloud-Workloads."
David EstlickCISO
"„Wiz bietet eine zentrale Oberfläche, um zu sehen, was in unseren Cloud-Umgebungen vor sich geht.“ "
Adam FletcherSicherheitsbeauftragter
"„Wir wissen, dass, wenn Wiz etwas als kritisch identifiziert, es auch tatsächlich ist.“"
Greg PoniatowskiLeiter Bedrohungs- und Schwachstellenmanagement