PatchSiren cyber security CVE debrief
CVE-2016-7164 Libtorrent CVE debrief
CVE-2016-7164 is a remote denial-of-service vulnerability in libtorrent 1.1.x. A crafted GZIP response from a torrent tracker can trigger a segmentation fault in puff.cpp’s construct function, causing the application to crash. The NVD rates the issue HIGH with a CVSS v3.0 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H.
- Vendor
- Libtorrent
- Product
- CVE-2016-7164
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-07
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-07
- Advisory updated
- 2026-05-13
Who should care
Developers and operators using libtorrent 1.1.x, especially applications that connect to untrusted or external torrent trackers. Package maintainers, distro security teams, and anyone shipping libtorrent as an embedded dependency should also review exposure.
Technical summary
The provided NVD record describes a network-reachable denial of service affecting libtorrent 1.1.*. The failure is triggered by a crafted GZIP response handled by puff.cpp, leading to a segmentation fault and crash. NVD maps the issue to CWE-20 (Improper Input Validation) and lists the attack vector as network-based with no privileges or user interaction required.
Defensive priority
High
Recommended defensive actions
- Inventory all installations and embedded copies of libtorrent 1.1.x across servers, desktop software, appliances, and bundled dependencies.
- Upgrade to a vendor or upstream release that includes the fix, or apply your distribution’s backported security update if available.
- Treat tracker responses as untrusted input and minimize exposure to external trackers where operationally possible.
- Rebuild and redeploy dependent packages after patching, including any applications that statically or vendored libtorrent.
- Add regression testing and monitoring for crashes or segmentation faults in code paths that process compressed tracker responses.
Evidence notes
The debrief is based on the official CVE/NVD records supplied in the corpus. NVD lists the affected CPE scope as libtorrent 1.1.* and the weakness as CWE-20. The provided description states that a crafted GZIP response from remote torrent trackers can cause a segmentation fault and crash in puff.cpp’s construct function. The reference set also points to Openwall mailing-list posts and GitHub issue/PR entries related to patching and tracking.
Official resources
-
CVE-2016-7164 CVE record
CVE.org
-
CVE-2016-7164 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
Publicly disclosed in the CVE/NVD record on 2017-02-07, with the supplied record last modified on 2026-05-13. The reference set includes upstream mailing-list and GitHub tracking links used for patch coordination.