PatchSiren cyber security CVE debrief
CVE-2016-5035 Libdwarf Project CVE debrief
CVE-2016-5035 affects libdwarf’s _dwarf_read_line_table_header function in dwarf_line_table_reader.c. A crafted file can trigger an out-of-bounds read and deny service to applications that parse the file, with NVD rating the issue as medium severity (CVSS 6.5).
- Vendor
- Libdwarf Project
- Product
- CVE-2016-5035
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Developers and maintainers of software that embeds libdwarf or parses DWARF/debug information, plus security teams responsible for tools that accept untrusted or user-supplied files. This matters most where file parsing is exposed to users, uploads, or automated ingestion pipelines.
Technical summary
According to the NVD record, the vulnerable condition is an out-of-bounds read in _dwarf_read_line_table_header within dwarf_line_table_reader.c in libdwarf before 20160923. The issue is mapped to CWE-125 and can be triggered by a crafted file, producing a denial of service rather than documented code execution or data modification. The NVD CVSS vector is AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating user interaction is required for the vulnerable parsing path.
Defensive priority
Medium
Recommended defensive actions
- Upgrade libdwarf to 20160923 or later, or backport the vendor fix if you ship an older branch.
- Inventory applications, libraries, and build tools that embed or depend on libdwarf.
- Treat untrusted DWARF/debug files as attacker-controlled input and limit where they can be parsed.
- Add regression tests and fuzz coverage for DWARF line table parsing, especially header handling.
- Monitor for parser crashes or abnormal termination in workflows that ingest external files.
Evidence notes
The NVD record identifies CVE-2016-5035 as an out-of-bounds read (CWE-125) in libdwarf before 20160923, with a vulnerable CPE range ending exclusively at 2016-09-23. The CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The supplied references include an oss-security mailing-list post tagged as Patch on 2016-05-24, a related oss-security post tagged as Exploit on 2016-05-25, and a third-party advisory at prevanders.net/dwarfbug.html. The CVE was published on 2017-02-17 and later modified on 2026-05-13 in the supplied NVD metadata.
Official resources
-
CVE-2016-5035 CVE record
CVE.org
-
CVE-2016-5035 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Exploit, Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
Publicly recorded in the supplied CVE metadata on 2017-02-17. Related source references in the NVD metadata date to 2016-05-24 and 2016-05-25, but those are advisory discussion dates and not the CVE issue date. NVD metadata was last marked