<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libpng16</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20083-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-22T14:29:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-22T14:29:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-22T14:29:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libpng16</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libpng16 fixes the following issues:

- CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525).
- CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in png_image_write_* (bsc#1256526).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-172</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256525</URL>
      <Description>SUSE Bug 1256525</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256526</URL>
      <Description>SUSE Bug 1256526</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-22695/</URL>
      <Description>SUSE CVE CVE-2026-22695 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-22801/</URL>
      <Description>SUSE CVE CVE-2026-22801 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-16-1.6.44-160000.4.1">
      <FullProductName ProductID="libpng16-16-1.6.44-160000.4.1">libpng16-16-1.6.44-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-16-x86-64-v3-1.6.44-160000.4.1">
      <FullProductName ProductID="libpng16-16-x86-64-v3-1.6.44-160000.4.1">libpng16-16-x86-64-v3-1.6.44-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-compat-devel-1.6.44-160000.4.1">
      <FullProductName ProductID="libpng16-compat-devel-1.6.44-160000.4.1">libpng16-compat-devel-1.6.44-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1">
      <FullProductName ProductID="libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1">libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-devel-1.6.44-160000.4.1">
      <FullProductName ProductID="libpng16-devel-1.6.44-160000.4.1">libpng16-devel-1.6.44-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-devel-x86-64-v3-1.6.44-160000.4.1">
      <FullProductName ProductID="libpng16-devel-x86-64-v3-1.6.44-160000.4.1">libpng16-devel-x86-64-v3-1.6.44-160000.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpng16-tools-1.6.44-160000.4.1">
      <FullProductName ProductID="libpng16-tools-1.6.44-160000.4.1">libpng16-tools-1.6.44-160000.4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libpng16-16-1.6.44-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libpng16-16-1.6.44-160000.4.1">libpng16-16-1.6.44-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-16-x86-64-v3-1.6.44-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.4.1">libpng16-16-x86-64-v3-1.6.44-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-compat-devel-1.6.44-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.4.1">libpng16-compat-devel-1.6.44-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1">libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-devel-1.6.44-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.4.1">libpng16-devel-1.6.44-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-devel-x86-64-v3-1.6.44-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.4.1">libpng16-devel-x86-64-v3-1.6.44-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpng16-tools-1.6.44-160000.4.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.4.1">libpng16-tools-1.6.44-160000.4.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.</Note>
    </Notes>
    <CVE>CVE-2026-22695</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libpng16-16-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-22695.html</URL>
        <Description>CVE-2026-22695</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256525</URL>
        <Description>SUSE Bug 1256525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.</Note>
    </Notes>
    <CVE>CVE-2026-22801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:libpng16-16-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.4.1</ProductID>
        <ProductID>openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.4.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-22801.html</URL>
        <Description>CVE-2026-22801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256526</URL>
        <Description>SUSE Bug 1256526</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
