inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
22 Jun 2022, 17:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Workstation
Oracle jre Oracle database Server Apple tvos Oracle jdk Redhat enterprise Linux Server Zlib zlib Canonical Debian debian Linux Apple watchos Redhat enterprise Linux Desktop Redhat enterprise Linux Eus Oracle mysql Apple iphone Os Redhat Debian Apple Redhat satellite Canonical ubuntu Linux Apple mac Os X Zlib Oracle |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:1221 - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:1222 - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208113 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1039427 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - Patch, Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1402345 - Issue Tracking, Patch, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:2999 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3453 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208115 - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208112 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4292-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3047 - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208144 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:1220 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3046 - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202007-54 - Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory | |
References | (CONFIRM) https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0 - Patch, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4246-1/ - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html - Mailing List, Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:* cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
Information
Published : 2017-05-23 04:29
Updated : 2022-06-22 17:08
NVD link : CVE-2016-9840
Mitre link : CVE-2016-9840
JSON object : View
Products Affected
oracle
- jdk
- database_server
- mysql
- jre
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_eus
- satellite
- enterprise_linux_server
apple
- tvos
- watchos
- iphone_os
- mac_os_x
zlib
- zlib
canonical
- ubuntu_linux
opensuse
- leap
- opensuse
debian
- debian_linux
CWE