Debian alert DSA-6076-1 (libpng1.6)
| From: | Salvatore Bonaccorso <carnil@debian.org> | |
| To: | debian-security-announce@lists.debian.org | |
| Subject: | [SECURITY] [DSA 6076-1] libpng1.6 security update | |
| Date: | Wed, 10 Dec 2025 08:54:19 +0000 | |
| Message-ID: | <E1vTFxj-00Cp8P-2C@seger.debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6076-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso December 10, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libpng1.6 CVE ID : CVE-2025-64505 CVE-2025-64506 CVE-2025-64720 CVE-2025-65018 CVE-2025-66293 Debian Bug : 1121216 1121217 1121218 1121219 1121877 Several vulnerabilities were reported in the libpng PNG library, which could lead to information leaks, denial of service or potentially the execution of arbitrary code if a specially crafted image is processed. For the oldstable distribution (bookworm), these problems have been fixed in version 1.6.39-2+deb12u1. For the stable distribution (trixie), these problems have been fixed in version 1.6.48-1+deb13u1. We recommend that you upgrade your libpng1.6 packages. For the detailed security status of libpng1.6 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libpng1.6 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmk5M+xfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QsoQ//RZeOMBTdveBXvB05ch5LbmMZHHn6R4lF8bk++NJGa5TmmzCdq0qKnbNm slPygxbz2xgVepppB93MTPT/WLkw2rm9B0oZ7pmj/PKhYaZPMENxCtPNaCfwc1So zjLnazOzXAJGg6zg7ZC7DasjOGVNfeWOn7x0fZLyKQOu3IvBcxHabXQ+SjkVV8u6 vSyRG6WFq2gJsN8Ib4cFMprlUIVYO4id4RUYCrUT+UFuqf6NxOXKvL0K/RWiWBqn aCZLvTXejtSTNQkKdbXTXg4ZaqbNqoym/6nZgfP01eqmrQvZCO4uUGqH9hZec++G RDSRzKvrvKrvMrtjAQyYpk6fy/vMwI2mxbMaowel7TwF51PlECe3RF9XdoYgpGcx oeGFN33M2zOtBzavffNkZI6KS8ExWdNUo1ckNjDGjMBhEOjSnrGCkyjmaw+estsh nNVkJTUCL816ZE+K1Jl5CN6QKRQBcto9d5Jb2DKsUhAkV92v70uQs1/lVfGf56Wz 9FbdEVujOyLL+PSk01er/TQp9XD7UYHasIz6pSW6N8+SomdEgsx7+8LQOyPAR6MW Jz8RC2KGNUs9M8TFzY+jM07eQQcQathonc88yoFSE4J/L3oxxsVFbhsOu+jhINdL uxmK74F3pKQew8MEHyAqm9bkLigEz9yC2Imvx3I64uLMCT+IAIs= =85I2 -----END PGP SIGNATURE-----
