Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.9

Libpng PNM Converter Allows Local Code Execution

UBUNTU-CVE-2026-3713
Summary

A flaw in the Libpng PNM converter can allow an attacker to execute malicious code on a local system. This affects the PNM converter tool and can be exploited by a local attacker. To protect your system, update Libpng to a version higher than 1.6.55.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
canonical libpng All versions
canonical libpng All versions
canonical libpng1.6 All versions
canonical libpng1.6 All versions
canonical libpng1.6 All versions
canonical libpng1.6 All versions
canonical libpng1.6 All versions
canonical libpng1.6 All versions
Original title
A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation o...
Original description
A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
osv CVSS3.1 5.3
osv CVSS4.0 6.9
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026