PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-7510 Libdwarf Project CVE debrief

CVE-2016-7510 affects libdwarf’s read_line_table_program function and can let a remote attacker trigger an out-of-bounds read when crafted input is parsed. The practical impact is denial of service, with the NVD rating this as medium severity (CVSS 6.5) and listing availability as the primary concern.

Vendor
Libdwarf Project
Product
CVE-2016-7510
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-17
Original CVE updated
2026-05-13
Advisory published
2017-02-17
Advisory updated
2026-05-13

Who should care

Organizations and developers that use libdwarf to parse externally supplied DWARF data, especially in automated analysis pipelines, build systems, crash processing, or file ingestion services.

Technical summary

NVD describes the issue as an out-of-bounds read in dwarf_line_table_reader_common.c, specifically read_line_table_program. The vulnerable version range in NVD ends before 2016-09-23. The assigned weakness is CWE-125 (Out-of-bounds Read). The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating no privileges are needed, user interaction is required, and the main effect is availability loss.

Defensive priority

Medium. The bug can crash parsers that handle attacker-controlled or untrusted inputs, so it matters most wherever libdwarf is exposed to external files or ingestion workflows.

Recommended defensive actions

  • Upgrade libdwarf to 20160923 or later, or apply the vendor patch if you maintain a downstream package.
  • Review any service, tool, or pipeline that parses untrusted DWARF content and limit exposure where possible.
  • Add crash monitoring and input-validation controls around file processing paths that use libdwarf.
  • If you cannot upgrade immediately, backport the upstream or distribution patch referenced in the issue tracker.

Evidence notes

The NVD record states the flaw is an out-of-bounds read in read_line_table_program and marks CWE-125. It also shows the vulnerable version range ending before 2016-09-23. The linked SourceForge bug is tagged as a patch reference, and the Red Hat Bugzilla entry is a third-party advisory reference.

Official resources

CVE published on 2017-02-17; the supplied record was last modified on 2026-05-13. The vulnerability itself affects libdwarf versions before 2016-09-23.