CVE-2019-7317

png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html VDB Entry Third Party Advisory
http://www.securityfocus.com/bid/108098 Not Applicable Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:1265 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1267 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1269 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1308 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1309 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1310 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2494 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2495 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2585 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2590 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2592 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2737 Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803 Issue Tracking Mailing List Third Party Advisory
https://github.com/glennrp/libpng/issues/275 Exploit Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Apr/30 Issue Tracking Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Apr/36 Issue Tracking Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/May/56 Issue Tracking Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/May/59 Issue Tracking Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/May/67 Issue Tracking Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201908-02 Third Party Advisory
https://security.netapp.com/advisory/ntap-20190719-0005/ Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us Third Party Advisory
https://usn.ubuntu.com/3962-1/ Third Party Advisory
https://usn.ubuntu.com/3991-1/ Third Party Advisory
https://usn.ubuntu.com/3997-1/ Third Party Advisory
https://usn.ubuntu.com/4080-1/ Third Party Advisory
https://usn.ubuntu.com/4083-1/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4435 Third Party Advisory
https://www.debian.org/security/2019/dsa-4448 Third Party Advisory
https://www.debian.org/security/2019/dsa-4451 Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*

Configuration 10 (hide)

OR cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

23 May 2022, 15:02

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:java_se:11.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:12.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*

25 Apr 2022, 14:09

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2019/dsa-4448 - (DEBIAN) https://www.debian.org/security/2019/dsa-4448 - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Apr/36 - Mailing List, Third Party Advisory (BUGTRAQ) https://seclists.org/bugtraq/2019/Apr/36 - Issue Tracking, Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html - Mailing List, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1267 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1267 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2737 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2737 - Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4451 - (DEBIAN) https://www.debian.org/security/2019/dsa-4451 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1310 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1310 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1265 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1265 - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4080-1/ - (UBUNTU) https://usn.ubuntu.com/4080-1/ - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1308 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1308 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1269 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1269 - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/May/59 - (BUGTRAQ) https://seclists.org/bugtraq/2019/May/59 - Issue Tracking, Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/May/67 - (BUGTRAQ) https://seclists.org/bugtraq/2019/May/67 - Issue Tracking, Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/May/56 - (BUGTRAQ) https://seclists.org/bugtraq/2019/May/56 - Issue Tracking, Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Apr/30 - Mailing List, Third Party Advisory (BUGTRAQ) https://seclists.org/bugtraq/2019/Apr/30 - Issue Tracking, Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2495 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2495 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html - Mailing List, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/108098 - (BID) http://www.securityfocus.com/bid/108098 - Not Applicable, Third Party Advisory, VDB Entry
References (CONFIRM) https://security.netapp.com/advisory/ntap-20190719-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20190719-0005/ - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/3997-1/ - (UBUNTU) https://usn.ubuntu.com/3997-1/ - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/3991-1/ - (UBUNTU) https://usn.ubuntu.com/3991-1/ - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2590 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2590 - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4083-1/ - (UBUNTU) https://usn.ubuntu.com/4083-1/ - Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1309 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1309 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2592 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2592 - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/201908-02 - (GENTOO) https://security.gentoo.org/glsa/201908-02 - Third Party Advisory
References (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803 - Mailing List, Third Party Advisory (MISC) https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803 - Issue Tracking, Mailing List, Third Party Advisory
References (MISC) https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - (MISC) https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2585 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2585 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2494 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2494 - Third Party Advisory
References (CONFIRM) https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us - (CONFIRM) https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us - Third Party Advisory
CPE cpe:2.3:a:libpng:libpng:1.6.36:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:11.0.3:*:*:*:*:*:*:*
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
cpe:2.3:a:oracle:java_se:12.0.1:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

20 Oct 2021, 11:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html -

14 Jun 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html -

Information

Published : 2019-02-04 08:29

Updated : 2024-02-04 20:03


NVD link : CVE-2019-7317

Mitre link : CVE-2019-7317

CVE.ORG link : CVE-2019-7317


JSON object : View

Products Affected

redhat

  • enterprise_linux_for_ibm_z_systems
  • enterprise_linux_for_power_little_endian
  • enterprise_linux_for_scientific_computing
  • satellite
  • enterprise_linux_desktop
  • enterprise_linux
  • enterprise_linux_workstation
  • enterprise_linux_for_power_big_endian

netapp

  • e-series_santricity_storage_manager
  • e-series_santricity_management
  • cloud_backup
  • snapmanager
  • oncommand_workflow_automation
  • active_iq_unified_manager
  • plug-in_for_symantec_netbackup
  • steelstore
  • e-series_santricity_unified_manager
  • oncommand_insight
  • e-series_santricity_web_services

libpng

  • libpng

oracle

  • mysql
  • jdk
  • hyperion_infrastructure_technology
  • java_se

mozilla

  • thunderbird
  • firefox_esr

suse

  • linux_enterprise

opensuse

  • package_hub
  • leap

hp

  • xp7_command_view

canonical

  • ubuntu_linux

debian

  • debian_linux

hpe

  • xp7_command_view_advanced_edition_suite
CWE
CWE-416

Use After Free