PatchSiren cyber security CVE debrief
CVE-2016-5031 Libdwarf Project CVE debrief
CVE-2016-5031 is a denial-of-service issue in libdwarf’s print_frame_inst_bytes function. A crafted file can trigger an out-of-bounds read in affected versions of libdwarf before 2016-09-23, so any workflow that parses untrusted DWARF data should treat this as a reliability risk.
- Vendor
- Libdwarf Project
- Product
- CVE-2016-5031
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Teams that build, distribute, or embed libdwarf; maintainers of tools that parse DWARF/debug information; and operators whose systems process untrusted files produced by external parties.
Technical summary
NVD describes the flaw as an out-of-bounds read in print_frame_inst_bytes, classified as CWE-125. The vulnerable CPE range covers libdwarf versions before 2016-09-23. NVD’s CVSS vector is AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, which indicates a denial-of-service impact with user interaction required in the assessed scenario.
Defensive priority
Medium priority. This is a crash/availability issue rather than a code-execution flaw, but it matters anywhere libdwarf processes untrusted input or is used in automated analysis pipelines.
Recommended defensive actions
- Update libdwarf to a release at or after 2016-09-23.
- Inventory products and internal tools that bundle or statically link libdwarf.
- Restrict or sandbox parsing of untrusted files where feasible.
- Add regression tests for malformed DWARF inputs and monitor for parser crashes.
- If immediate upgrading is not possible, reduce exposure by limiting which files are accepted from untrusted sources.
Evidence notes
The vulnerability description, CVSS vector, and CWE come from NVD. NVD lists libdwarf as vulnerable before 2016-09-23 and cites OSS-security references dated 2016-05-24 and 2016-05-25, plus a third-party advisory at prevanders.net. The published CVE date used here is 2017-02-17; the 2026 modified date reflects later metadata updates, not a new issue date.
Official resources
-
CVE-2016-5031 CVE record
CVE.org
-
CVE-2016-5031 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Exploit, Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
Publicly disclosed in the NVD/CVE record on 2017-02-17, with related OSS-security references from May 2016 and a third-party advisory reference.