Amazon Linux 2 Security Advisory: ALAS2-2025-3113
Advisory Released Date: 2026-01-05
Advisory Updated Date: 2026-01-05
A heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. (CVE-2025-64505)
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component <= alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51. (CVE-2025-64720)
Affected Packages:
libpng12
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update libpng12 or yum update --advisory ALAS2-2025-3113 to update your system.
aarch64:
libpng12-1.2.50-10.amzn2.0.3.aarch64
libpng12-devel-1.2.50-10.amzn2.0.3.aarch64
libpng12-debuginfo-1.2.50-10.amzn2.0.3.aarch64
i686:
libpng12-1.2.50-10.amzn2.0.3.i686
libpng12-devel-1.2.50-10.amzn2.0.3.i686
libpng12-debuginfo-1.2.50-10.amzn2.0.3.i686
src:
libpng12-1.2.50-10.amzn2.0.3.src
x86_64:
libpng12-1.2.50-10.amzn2.0.3.x86_64
libpng12-devel-1.2.50-10.amzn2.0.3.x86_64
libpng12-debuginfo-1.2.50-10.amzn2.0.3.x86_64