Integer overflow in the readSubStreamsInfo function in archivereadsupportformat_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "3.2.0"
}
],
"cpe": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "7.2"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "7.2"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "7.2"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"fixed": "3.2.1"
}
],
"source": "DESCRIPTION"
}
]
}"2026-05-06T23:52:54Z"
[
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2016-4300-15650bc9",
"target": {
"function": "read_SubStreamsInfo",
"file": "libarchive/archive_read_support_format_7zip.c"
},
"deprecated": false,
"digest": {
"function_hash": "46239902704382672067472777073698420896",
"length": 2649.0
},
"source": "https://github.com/libarchive/libarchive/commit/e79ef306afe332faf22e9b442a2c6b59cb175573"
},
{
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2016-4300-dee1363a",
"target": {
"file": "libarchive/archive_read_support_format_7zip.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"114121825398685049637523548521724163081",
"158255184811572789911284109468266521732",
"335493315037050148892950470981890599307",
"209098857150887945768214746267601235406"
],
"threshold": 0.9
},
"source": "https://github.com/libarchive/libarchive/commit/e79ef306afe332faf22e9b442a2c6b59cb175573"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4300.json"