{"id":"CVE-2016-7166","details":"libarchive before 3.2.0 does not limit the number of recursive decompressions, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted gzip file.","modified":"2026-04-11T05:00:45.572237Z","published":"2016-09-21T14:25:29.833Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/09/08/15"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/92901"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1850.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/09/08/18"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-03"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1844.html"},{"type":"REPORT","url":"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207362"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1347086"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/commit/6e06b1c89dd0d16f74894eac4cfc1327a06ee4a0"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/issues/660"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"last_affected":"74583ab6fdbf1a2837d8102c0075ff4eeeede320"},{"fixed":"6e06b1c89dd0d16f74894eac4cfc1327a06ee4a0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.1.901a"}]}}],"versions":["v3.0.0a","v3.0.1b","v3.1.900a","v3.1.901a"],"database_specific":{"vanir_signatures":[{"target":{"file":"libarchive/archive_read.c"},"signature_version":"v1","source":"https://github.com/libarchive/libarchive/commit/6e06b1c89dd0d16f74894eac4cfc1327a06ee4a0","id":"CVE-2016-7166-331730fd","signature_type":"Line","digest":{"line_hashes":["322249619529619440321848821059704942456","204323184115947032942788606140734167829","53128830481938165057533978090971461410","210842141848661018861781229891885568107","92955886637755593085125416091092887801","39239856261147431992750255720530106608","219001906336049789283271144702296850611","300793396999789703062089561275547917723","50602967525767722369012125206287191903","101939981856117434506075189448118884993","41696469281611705517438622574604691789","93662261141235397336793541586627527916","14922624608788651983020252531567255043"],"threshold":0.9},"deprecated":false},{"target":{"function":"choose_filters","file":"libarchive/archive_read.c"},"signature_version":"v1","source":"https://github.com/libarchive/libarchive/commit/6e06b1c89dd0d16f74894eac4cfc1327a06ee4a0","id":"CVE-2016-7166-5a996891","signature_type":"Function","digest":{"length":1074,"function_hash":"275373803838793477454246285970392479828"},"deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7166.json","vanir_signatures_modified":"2026-04-11T05:00:45Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6"}]},{"events":[{"introduced":"0"},{"last_affected":"7"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}