PatchSiren cyber security CVE debrief
CVE-2016-5029 Libdwarf Project CVE debrief
CVE-2016-5029 describes a denial-of-service flaw in libdwarf before 20160923. A crafted DWARF file can trigger a NULL pointer dereference in create_fullest_file_path, allowing remote attackers to crash affected software. NVD classifies the issue as CVSS 6.5 with availability impact only.
- Vendor
- Libdwarf Project
- Product
- CVE-2016-5029
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Teams that ship or embed libdwarf, especially applications, services, or tools that parse untrusted DWARF files. Security and platform owners should also care if any downstream package still includes a libdwarf build earlier than 20160923.
Technical summary
The vulnerable condition is a NULL pointer dereference in libdwarf's create_fullest_file_path function. According to NVD, affected versions are those before 20160923, and the issue is reachable through a crafted DWARF file. NVD maps the weakness to CWE-476 and scores it CVSS 3.1: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H.
Defensive priority
Medium
Recommended defensive actions
- Upgrade libdwarf to 20160923 or later, or to a vendor package that explicitly includes that fix.
- Inventory products and build artifacts that bundle libdwarf, since downstream copies may remain vulnerable even if the upstream project has been fixed.
- Treat untrusted DWARF files as hostile input and limit where parsing occurs, especially in exposed or user-facing workflows.
- If immediate upgrading is not possible, reduce exposure by restricting who can supply DWARF files and by isolating parsers that process them.
- Add crash monitoring for DWARF-processing components so NULL dereference failures are detected quickly.
Evidence notes
Source evidence is consistent across NVD and the linked advisories: the affected component is libdwarf before 20160923, the faulty path is create_fullest_file_path, and the impact is denial of service via NULL pointer dereference. NVD lists the weakness as CWE-476 and the CVSS vector as CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The advisory references include an Openwall oss-security patch notice dated 2016-05-24, a related follow-up dated 2016-05-25, and a prevanders.net advisory page.
Official resources
-
CVE-2016-5029 CVE record
CVE.org
-
CVE-2016-5029 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Exploit, Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
The CVE record was published by NVD on 2017-02-17 and later modified on 2026-05-13. The linked references show public discussion in May 2016, but the CVE publication date in this record is 2017-02-17.