Double-free vulnerability in the sPLT chunk structure and png.c in pngcrush before 1.7.87 allows attackers to have unspecified impact via unknown vectors.
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pngcrush | Pngcrush_project | * | 1.7.86 (including) |
Pngcrush | Ubuntu | artful | * |
Pngcrush | Ubuntu | bionic | * |
Pngcrush | Ubuntu | cosmic | * |
Pngcrush | Ubuntu | disco | * |
Pngcrush | Ubuntu | esm-apps/bionic | * |
Pngcrush | Ubuntu | esm-apps/xenial | * |
Pngcrush | Ubuntu | esm-infra-legacy/trusty | * |
Pngcrush | Ubuntu | trusty | * |
Pngcrush | Ubuntu | trusty/esm | * |
Pngcrush | Ubuntu | upstream | * |
Pngcrush | Ubuntu | xenial | * |
Pngcrush | Ubuntu | zesty | * |