JLSEC-2025-329

Source
https://github.com/JuliaLang/SecurityAdvisories.jl/blob/main/advisories/published/2025/JLSEC-2025-329.md
Import Source
https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-329.json
JSON Data
https://api.osv.dev/v1/vulns/JLSEC-2025-329
Upstream
Published
2025-12-01T22:31:38.231Z
Modified
2025-12-01T23:02:45.965632Z
Summary
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portabl...
Details

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's pngwriteimage8bit function when processing 8-bit images through the simplified write API with convertto_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.

Database specific
{
    "license": "CC-BY-4.0",
    "sources": [
        {
            "id": "CVE-2025-64506",
            "imported": "2025-11-27T03:28:04.930Z",
            "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-64506",
            "modified": "2025-11-26T18:34:38.240Z",
            "published": "2025-11-25T00:15:47.300Z",
            "html_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64506"
        }
    ]
}
References

Affected packages

Julia / libpng_jll

Package

Name
libpng_jll
Purl
pkg:julia/libpng_jll?uuid=b53b4c65-9356-5827-b1ea-8c7a1a84506f

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.51+0