2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2019-7317" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2019-02-04T08:29:00.447" ,
2024-11-23 11:10:51 +00:00
"lastModified" : "2024-11-21T04:48:00.033" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute."
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n png_image_free en el archivo png.c en libpng versiones 1.6.x anteriores a 1.6.37, presenta un uso de la memoria previamente liberada porque la funci\u00f3n png_image_free_function es llamada bajo png_safe_execute."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" ,
2024-11-23 11:10:51 +00:00
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 11:10:51 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.6 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:H/Au:N/C:N/I:N/A:P" ,
2024-11-23 11:10:51 +00:00
"baseScore" : 2.6 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-23 11:10:51 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 4.9 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-416"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.6.0" ,
"versionEndExcluding" : "1.6.37" ,
"matchCriteriaId" : "078AA00A-515F-493E-A53E-FE1937FA8018"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DEECE5FC-CACF-4496-A3E7-164736409252"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "712507AC-DAB8-4FFE-9426-08282919411F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" ,
"matchCriteriaId" : "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ,
"matchCriteriaId" : "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07C312A0-CD2C-4B9C-B064-6409B25C278F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD783B0C-9246-47D9-A937-6144FE8BFF0F"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C21D62F-F3DD-4E9E-B644-07CCC49F3D53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3999BDC1-BA77-4DBE-8041-D993BA9FF04D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2B2677D-6B48-45A2-8567-AB6DB9FF1B45"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EAF3DD5E-1A96-4285-84BA-EB5E31EF2516"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "32318CC6-B8C4-4429-BB8B-134DC202A27E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "8.0.23" ,
"matchCriteriaId" : "0185E85D-2C64-4D77-BC1D-A20165D5078E"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*" ,
"versionEndExcluding" : "8.7.0-00" ,
"matchCriteriaId" : "6B07BDE2-FE50-4C0E-9C73-6AA6C1D6C060"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "8.7.0-00" ,
"matchCriteriaId" : "BE33C1F1-DED8-424C-8942-E1A48A9EBA05"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
2024-10-21 14:03:55 +00:00
"criteria" : "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97D4FFCF-5309-43B6-9FD5-680C6D535A7F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF583CDC-DE9E-45AB-9861-CB203BFA8862"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1E78106-58E6-4D59-990F-75DA575BFAD9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B620311B-34A3-48A6-82DF-6F078D7A4493"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-11-23 11:10:51 +00:00
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7B8B0B75-0DF2-4B5C-BC81-2F8E172AEE4E"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
2024-11-23 11:10:51 +00:00
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CBC8B78D-1131-4F21-919D-8AC79A410FB9"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*" ,
"versionEndExcluding" : "9.6" ,
"matchCriteriaId" : "60429DC5-C403-41D1-9DDF-30782D012DF6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*" ,
"versionEndExcluding" : "9.6" ,
"matchCriteriaId" : "95571D2E-5C83-484C-A44F-AC36972C67D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*" ,
"matchCriteriaId" : "3AF659DD-C4AE-4DDC-B50B-327A717EFC74"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*" ,
"matchCriteriaId" : "40E21C6E-AEDF-43E8-AA80-629C77D24DF7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5C2089EE-5D7F-47EC-8EA5-0F69790564C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*" ,
"matchCriteriaId" : "BADA4949-F766-4092-A6BC-1B85B5FB60FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "11.53" ,
"matchCriteriaId" : "1FC01AF8-4A4B-4FC4-B07F-1193FEFF5A47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.2" ,
"matchCriteriaId" : "8557ED41-5B30-47C8-A556-6C1F6E8E227B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*" ,
"versionEndExcluding" : "4.0" ,
"matchCriteriaId" : "C7E42333-853D-4938-90EB-2A6653476357"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "7.3.9" ,
"matchCriteriaId" : "82DC1F62-0DA2-4BB8-9AFE-4BC4366205F5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "5.1" ,
"matchCriteriaId" : "2798786F-A818-4C52-BC20-0A69DB49D16A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FFE0A9D2-9A49-4BF6-BC6F-8249162D8334"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*" ,
"versionEndExcluding" : "3.4.2" ,
"matchCriteriaId" : "41436638-0B88-4823-8208-81C01F2CA6A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*" ,
"versionEndExcluding" : "3.4.2" ,
"matchCriteriaId" : "910F5303-1F70-44E3-A951-567447BC46FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*" ,
"matchCriteriaId" : "1925AC26-45D4-46D5-ACDD-91E5A90977B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*" ,
"matchCriteriaId" : "9DC6435A-8369-4D18-A6EE-84E73D6AA84D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0DF5449D-22D2-48B4-8F50-57B43DCB15B9"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4F86C3C-B99C-44C6-97D7-163DC3F59687"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5291B60-AB52-4830-8E1A-8048A471902C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "566507B6-AC95-47F7-A3FB-C6F414E45F51"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "87C21FE1-EA5C-498F-9C6C-D05F91A88217"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "25C8B513-76C1-4184-A253-CB32F04A05BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47811209-5CE5-4375-8391-B0A7F6A0E420"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "634C23AC-AC9C-43F4-BED8-1C720816D5E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "37CE1DC7-72C5-483C-8921-0B462C8284D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
2024-11-23 11:10:51 +00:00
"Third Party Advisory" ,
"VDB Entry"
2023-04-24 12:24:31 +02:00
]
} ,
{
"url" : "http://www.securityfocus.com/bid/108098" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Not Applicable" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1265" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1267" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1269" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1308" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1309" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1310" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2494" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2495" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2585" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2590" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2592" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2737" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/glennrp/libpng/issues/275" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Issue Tracking" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Apr/30" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Apr/36" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/May/56" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/May/59" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/May/67" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201908-02" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20190719-0005/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3962-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3991-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3997-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/4080-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/4083-1/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.debian.org/security/2019/dsa-4435" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.debian.org/security/2019/dsa-4448" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.debian.org/security/2019/dsa-4451" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuApr2021.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuoct2021.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
2024-11-23 11:10:51 +00:00
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/108098" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Not Applicable" ,
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1265" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1267" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1269" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1308" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1309" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:1310" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2494" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2495" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2585" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2590" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2592" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2019:2737" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/glennrp/libpng/issues/275" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Issue Tracking" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Apr/30" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/Apr/36" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/May/56" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/May/59" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://seclists.org/bugtraq/2019/May/67" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201908-02" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20190719-0005/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3962-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3991-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/3997-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/4080-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://usn.ubuntu.com/4083-1/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.debian.org/security/2019/dsa-4435" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.debian.org/security/2019/dsa-4448" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.debian.org/security/2019/dsa-4451" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuApr2021.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/security-alerts/cpuoct2021.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}