PatchSiren cyber security CVE debrief
CVE-2016-5032 Libdwarf Project CVE debrief
CVE-2016-5032 is a denial-of-service issue in libdwarf’s dwarf_get_xu_hash_entry function. A crafted file can trigger a crash in vulnerable versions before 20160923, affecting systems that process untrusted DWARF-containing content.
- Vendor
- Libdwarf Project
- Product
- CVE-2016-5032
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Organizations and developers that ship libdwarf directly or bundle it inside tools that parse object files, debug data, or other untrusted inputs should care most. Security teams should also review any downstream products that inherit libdwarf from a vendor package.
Technical summary
NVD classifies the weakness as CWE-125 and lists the vulnerable CPE range as libdwarf_project:libdwarf versions from 1999-12-14 up to, but not including, 2016-09-23. The NVD CVSS vector is AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating a network-reachable impact that depends on user interaction with a crafted file and results in availability loss rather than confidentiality or integrity impact.
Defensive priority
Medium
Recommended defensive actions
- Upgrade libdwarf to 20160923 or later, or apply the vendor patch/backport if an upgrade is not immediately possible.
- Inventory products and build images for bundled copies of libdwarf, including statically linked or vendor-supplied instances.
- Restrict and validate untrusted input files where libdwarf is used, especially workflows that open externally supplied debug or object files.
- Confirm that downstream packages have been rebuilt against a fixed libdwarf version and redeployed.
- Track the referenced advisory and vendor mailing list notes for any product-specific guidance.
Evidence notes
The NVD entry states that dwarf_get_xu_hash_entry in libdwarf before 20160923 allows remote attackers to cause a denial of service via a crafted file. NVD also maps the issue to CWE-125 and lists references to the openwall oss-security mailing list posts and the prevanders.net dwarfbug advisory. The CVSS vector includes user interaction, so the attack depends on a victim opening or processing the crafted file.
Official resources
-
CVE-2016-5032 CVE record
CVE.org
-
CVE-2016-5032 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Exploit, Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
The CVE was published by NVD on 2017-02-17, while the referenced advisory material dates back to May 2016. NVD last modified the record on 2026-05-13. The vulnerable version boundary given in the record is before 20160923.