{"id":"ALPINE-CVE-2016-9841","details":"inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.","modified":"2025-11-19T06:06:03.905048Z","published":"2017-05-23T04:29:01.743Z","upstream":["CVE-2016-9841"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2016-9841"}],"affected":[{"package":{"name":"perl","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.24.3-r1"}]}],"versions":["5.10.0-r0","5.10.0-r1","5.10.1-r0","5.10.1-r1","5.10.1-r2","5.12.1-r0","5.12.2-r0","5.12.2-r1","5.12.3-r0","5.14.0-r0","5.14.1-r0","5.14.2-r0","5.14.2-r1","5.16.0-r0","5.16.1-r0","5.16.2-r0","5.16.3-r0","5.18.0-r0","5.18.1-r0","5.18.2-r0","5.20.0-r0","5.20.1-r0","5.20.2-r0","5.20.2-r1","5.22.0-r0","5.22.1-r0","5.22.2-r0","5.24.0-r0","5.24.3-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-9841.json"}},{"package":{"name":"perl","ecosystem":"Alpine:v3.6","purl":"pkg:apk/alpine/perl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.24.3-r1"}]}],"versions":["5.10.0-r0","5.10.0-r1","5.10.1-r0","5.10.1-r1","5.10.1-r2","5.12.1-r0","5.12.2-r0","5.12.2-r1","5.12.3-r0","5.14.0-r0","5.14.1-r0","5.14.2-r0","5.14.2-r1","5.16.0-r0","5.16.1-r0","5.16.2-r0","5.16.3-r0","5.18.0-r0","5.18.1-r0","5.18.2-r0","5.20.0-r0","5.20.1-r0","5.20.2-r0","5.20.2-r1","5.22.0-r0","5.22.1-r0","5.22.2-r0","5.24.0-r0","5.24.0-r1","5.24.0-r2","5.24.1-r0","5.24.1-r1","5.24.1-r2","5.24.3-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-9841.json"}},{"package":{"name":"zlib","ecosystem":"Alpine:v3.3","purl":"pkg:apk/alpine/zlib?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.11-r0"}]}],"versions":["1.2.3.3-r2","1.2.3.3-r3","1.2.3.3-r4","1.2.3.3-r5","1.2.3.3-r6","1.2.3.3-r7","1.2.3.4-r0","1.2.3.4-r1","1.2.3.7-r0","1.2.3.7-r1","1.2.3.9-r0","1.2.4-r0","1.2.4-r1","1.2.5-r0","1.2.5-r1","1.2.5-r2","1.2.6-r0","1.2.7-r0","1.2.7-r1","1.2.8-r0","1.2.8-r1","1.2.8-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-9841.json"}},{"package":{"name":"zlib","ecosystem":"Alpine:v3.4","purl":"pkg:apk/alpine/zlib?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.11-r0"}]}],"versions":["1.2.3.3-r2","1.2.3.3-r3","1.2.3.3-r4","1.2.3.3-r5","1.2.3.3-r6","1.2.3.3-r7","1.2.3.4-r0","1.2.3.4-r1","1.2.3.7-r0","1.2.3.7-r1","1.2.3.9-r0","1.2.4-r0","1.2.4-r1","1.2.5-r0","1.2.5-r1","1.2.5-r2","1.2.6-r0","1.2.7-r0","1.2.7-r1","1.2.8-r0","1.2.8-r1","1.2.8-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-9841.json"}},{"package":{"name":"zlib","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/zlib?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.11-r0"}]}],"versions":["1.2.3.3-r2","1.2.3.3-r3","1.2.3.3-r4","1.2.3.3-r5","1.2.3.3-r6","1.2.3.3-r7","1.2.3.4-r0","1.2.3.4-r1","1.2.3.7-r0","1.2.3.7-r1","1.2.3.9-r0","1.2.4-r0","1.2.4-r1","1.2.5-r0","1.2.5-r1","1.2.5-r2","1.2.6-r0","1.2.7-r0","1.2.7-r1","1.2.8-r0","1.2.8-r1","1.2.8-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-9841.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}