PatchSiren cyber security CVE debrief
CVE-2016-4493 Gnu CVE debrief
CVE-2016-4493 affects GNU libiberty's cplus-dem.c demangling code. The supplied description says demangle_template_value_parm and do_hpacc_template_literal can trigger an out-of-bounds read and crash when given a crafted binary. NVD rates the issue CVSS 3.0 5.5 (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H), so the main security impact is denial of service rather than data exposure or code execution.
- Vendor
- Gnu
- Product
- CVE-2016-4493
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-24
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-24
- Advisory updated
- 2026-05-13
Who should care
Teams that ship or use GNU libiberty, especially tools or services that process untrusted binaries and rely on the cplus-dem demangler. Security owners for GCC-derived packages should also verify whether the referenced patch is included.
Technical summary
The NVD record ties the flaw to an out-of-bounds read in demangle_template_value_parm and do_hpacc_template_literal within cplus-dem.c in libiberty, with CWE-125 as the primary weakness. The supplied CVE description notes a crash caused by a crafted binary, and the NVD vector indicates a user-interaction-dependent availability issue.
Defensive priority
Medium. Prioritize if libiberty is exposed to untrusted binary inputs or if crashes in symbol demangling would have operational impact.
Recommended defensive actions
- Apply the vendor patch referenced in the supplied gcc-patches and Openwall advisory links, or upgrade to a package version that already includes it.
- Inventory software that embeds or depends on GNU libiberty and identify any paths that parse untrusted binaries.
- Restrict untrusted input to demangling or binary-inspection components until the patched build is deployed.
- Treat crashes in cplus-dem parsing as security-relevant and monitor for unexpected failures or core dumps.
- Verify downstream packages and distributions that bundle libiberty have incorporated the fix.
Evidence notes
The supplied NVD record states that CVE-2016-4493 affects cpe:2.3:a:gnu:libiberty:* and assigns CVSS 3.0 vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H with CWE-125. The CVE description explicitly mentions an out-of-bounds read and crash in demangle_template_value_parm and do_hpacc_template_literal in cplus-dem.c. Supporting references in the corpus include an Openwall mailing-list advisory/patch thread, GCC Bugzilla issue 70926, and a gcc-patches post.
Official resources
-
CVE-2016-4493 CVE record
CVE.org
-
CVE-2016-4493 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
- Source reference
-
Source reference
[email protected] - Issue Tracking
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
Published in the CVE/NVD record on 2017-02-24; the supplied advisory and patch references date to 2016-05-05. The 2026-05-13 modification date in the source reflects database updates, not the original issue date.