{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: Heap buffer over-read in png_write_image_* due to\n     truncation of ptrdiff_t row stride to png_uint_16\n     - debian/patches/CVE-2026-22801.patch: remove incorrect truncation\n       casts from png_write_image_16bit, png_write_image_8bit, and\n       png_image_write_main so large (>65535) and negative row strides\n       are handled correctly\n     - CVE-2026-22801\n   * SECURITY UPDATE: Heap buffer overflow in png_set_quantize due to\n     stale palette indices stored in the color distance hash table\n     - debian/patches/CVE-2026-25646.patch: store original palette\n       indices via palette_to_index in png_set_quantize so the\n       color-pruning loop does not read past the 769-element hash array\n     - CVE-2026-25646",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu20.04els/advisories/2026/clsa-2026_1777311274.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-27T17:35:26Z",
      "generator": {
        "date": "2026-04-27T17:35:26Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1777311274",
      "initial_release_date": "2026-04-27T17:35:26Z",
      "revision_history": [
        {
          "date": "2026-04-27T17:35:26Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2026-22801, CVE-2026-25646"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 20.04",
                "product": {
                  "name": "Ubuntu 20.04",
                  "product_id": "Ubuntu-20",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libpng16-16-0:1.6.37-2+tuxcare.els2.amd64",
                "product": {
                  "name": "libpng16-16-0:1.6.37-2+tuxcare.els2.amd64",
                  "product_id": "libpng16-16-0:1.6.37-2+tuxcare.els2.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/libpng16-16@1.6.37-2%2Btuxcare.els2?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
                "product": {
                  "name": "libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
                  "product_id": "libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/libpng-dev@1.6.37-2%2Btuxcare.els2?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
                "product": {
                  "name": "libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
                  "product_id": "libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/libpng-tools@1.6.37-2%2Btuxcare.els2?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpng16-16-0:1.6.37-2+tuxcare.els2.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
        },
        "product_reference": "libpng16-16-0:1.6.37-2+tuxcare.els2.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpng-dev-0:1.6.37-2+tuxcare.els2.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64"
        },
        "product_reference": "libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libpng-tools-0:1.6.37-2+tuxcare.els2.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64"
        },
        "product_reference": "libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-65018",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-65018"
        }
      ],
      "release_date": "2025-11-24T23:50:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T17:34:37.021293Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274",
          "product_ids": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-22801",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-22801"
        },
        {
          "category": "external",
          "summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8",
          "url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8"
        }
      ],
      "release_date": "2026-01-12T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T17:34:37.021293Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274",
          "product_ids": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-25646",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-25646"
        },
        {
          "category": "external",
          "summary": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88",
          "url": "https://github.com/pnggroup/libpng/commit/01d03b8453eb30ade759cd45c707e5a1c7277d88"
        },
        {
          "category": "external",
          "summary": "https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3",
          "url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-g8hp-mq4h-rqm3"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2026/02/09/7",
          "url": "http://www.openwall.com/lists/oss-security/2026/02/09/7"
        }
      ],
      "release_date": "2026-02-10T18:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T17:34:37.021293Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274",
          "product_ids": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-66293",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-66293"
        }
      ],
      "release_date": "2025-12-03T20:33:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T17:34:37.021293Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274",
          "product_ids": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-64720",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
          "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-64720"
        }
      ],
      "release_date": "2025-11-24T23:45:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-27T17:34:37.021293Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274",
          "product_ids": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1777311274"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:libpng-dev-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng-tools-0:1.6.37-2+tuxcare.els2.amd64",
            "Ubuntu-20:libpng16-16-0:1.6.37-2+tuxcare.els2.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}