The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
07 Nov 2023, 02:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.oracle.com/security-alerts/cpujul2020.html - | |
References | () http://www.securityfocus.com/bid/95131 - | |
References | () https://access.redhat.com/errata/RHSA-2017:3046 - | |
References | () http://www.openwall.com/lists/oss-security/2016/12/05/21 - | |
References | () https://support.apple.com/HT208115 - | |
References | () https://security.gentoo.org/glsa/201701-56 - | |
References | () http://www.securitytracker.com/id/1039427 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1220 - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html - | |
References | () https://support.apple.com/HT208144 - | |
References | () http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html - | |
References | () https://usn.ubuntu.com/4292-1/ - | |
References | () https://support.apple.com/HT208113 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1402348 - | |
References | () https://security.gentoo.org/glsa/202007-54 - | |
References | () https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib - | |
References | () http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html - | |
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html - | |
References | () https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958 - | |
References | () https://access.redhat.com/errata/RHSA-2017:3453 - | |
References | () https://support.apple.com/HT208112 - | |
References | () https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html - | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - | |
References | () https://access.redhat.com/errata/RHSA-2017:1221 - | |
References | () https://wiki.mozilla.org/images/0/09/Zlib-report.pdf - | |
References | () https://usn.ubuntu.com/4246-1/ - | |
References | () https://access.redhat.com/errata/RHSA-2017:3047 - | |
References | () https://access.redhat.com/errata/RHSA-2017:2999 - | |
References | () https://access.redhat.com/errata/RHSA-2017:1222 - |
16 Aug 2022, 13:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* |
|
First Time |
Nodejs
Nodejs node.js |
22 Jun 2022, 17:17
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux Workstation
Oracle jre Oracle database Server Apple tvos Oracle jdk Redhat enterprise Linux Server Canonical Debian debian Linux Apple watchos Redhat enterprise Linux Desktop Redhat enterprise Linux Eus Oracle mysql Apple iphone Os Redhat Debian Apple Redhat satellite Canonical ubuntu Linux Apple mac Os X Oracle |
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:zlib:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:* cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:* cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:1221 - Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Patch, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:1222 - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208113 - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2016/12/05/21 - Mailing List, Patch, Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://www.securitytracker.com/id/1039427 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - Patch, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:2999 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3453 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208115 - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208112 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4292-1/ - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3047 - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/HT208144 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:1220 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:3046 - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202007-54 - Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4246-1/ - Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1402348 - Issue Tracking, Patch, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html - Mailing List, Third Party Advisory |
Information
Published : 2017-05-23 04:29
Updated : 2023-12-10 12:01
NVD link : CVE-2016-9842
Mitre link : CVE-2016-9842
CVE.ORG link : CVE-2016-9842
JSON object : View
Products Affected
gnu
- zlib
debian
- debian_linux
apple
- watchos
- tvos
- mac_os_x
- iphone_os
redhat
- enterprise_linux_eus
- satellite
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_desktop
oracle
- database_server
- jdk
- mysql
- jre
opensuse
- leap
- opensuse
canonical
- ubuntu_linux
nodejs
- node.js
CWE