CVE-2016-9840

Name
CVE-2016-9840
Description
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html
Third Party Advisory http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html
Third Party Advisory http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html
Mailing List http://www.openwall.com/lists/oss-security/2016/12/05/21
Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Broken Link http://www.securityfocus.com/bid/95131
Broken Link http://www.securitytracker.com/id/1039427
Third Party Advisory https://access.redhat.com/errata/RHSA-2017:1220
Third Party Advisory https://access.redhat.com/errata/RHSA-2017:1221
Third Party Advisory https://access.redhat.com/errata/RHSA-2017:1222
Third Party Advisory https://access.redhat.com/errata/RHSA-2017:2999
Third Party Advisory https://access.redhat.com/errata/RHSA-2017:3046
Third Party Advisory https://access.redhat.com/errata/RHSA-2017:3047
Third Party Advisory https://access.redhat.com/errata/RHSA-2017:3453
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1402345
Patch https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
Mailing List https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
Mailing List https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html
Third Party Advisory https://security.gentoo.org/glsa/201701-56
Third Party Advisory https://security.gentoo.org/glsa/202007-54
Third Party Advisory https://support.apple.com/HT208112
Third Party Advisory https://support.apple.com/HT208113
Third Party Advisory https://support.apple.com/HT208115
Third Party Advisory https://support.apple.com/HT208144
Third Party Advisory https://usn.ubuntu.com/4246-1/
Third Party Advisory https://usn.ubuntu.com/4292-1/
Third Party Advisory https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
Broken Link https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
Third Party Advisory https://www.oracle.com/security-alerts/cpujul2020.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:boost:boost:*:*:*:*:*:*:*:* boost >= None < 1.78.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status