๐Ÿ” CVE Alert

CVE-2026-33636

HIGH 7.6

LIBPNG has ARM NEON Palette Expansion Out-of-Bounds Read on AArch64

CVSS Score
7.6
EPSS Score
0.0%
EPSS Percentile
0th

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue.

CWE CWE-125 CWE-787
Vendor pnggroup
Product libpng
Published Mar 26, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for pnggroup libpng

Be the first to know when new high vulnerabilities affecting pnggroup libpng are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High

Affected Versions

pnggroup / libpng
>= 1.6.36, < 1.6.56

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2 github.com: https://github.com/pnggroup/libpng/commit/7734cda20cf1236aef60f3bbd2267c97bbb40869 github.com: https://github.com/pnggroup/libpng/commit/aba9f18eba870d14fb52c5ba5d73451349e339c3