Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "3.2.0"
}
]
},
{
"cpe": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "6"
}
]
},
{
"cpe": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7"
}
]
},
{
"cpe": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "11.3"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "6.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "6.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "6.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.2"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "6.0"
}
]
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "7.0"
}
]
},
{
"source": "DESCRIPTION",
"extracted_events": [
{
"fixed": "3.2.1"
}
]
}
]
}[
{
"id": "CVE-2016-5844-551aa48b",
"digest": {
"function_hash": "309817211665878327421998864817834101098",
"length": 1894.0
},
"signature_type": "Function",
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22",
"target": {
"function": "choose_volume",
"file": "libarchive/archive_read_support_format_iso9660.c"
}
},
{
"id": "CVE-2016-5844-ce79393a",
"digest": {
"line_hashes": [
"287042840477540275625850996134666006298",
"87990772638453445820226490349349017729",
"312159165154221987531715771017557086519",
"128458302336956338563818647561733167893",
"22510921523173158530949685053004073533",
"22022931925010635123919134066395979860",
"104039671055020794243656096233377259206",
"169900654792378509325950266459606794229"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1",
"deprecated": false,
"source": "https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22",
"target": {
"file": "libarchive/archive_read_support_format_iso9660.c"
}
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5844.json"
"2026-05-06T23:15:37Z"