PatchSiren cyber security CVE debrief
CVE-2016-8680 Libdwarf Project CVE debrief
CVE-2016-8680 is a denial-of-service vulnerability in libdwarf's dwarfdump tooling. A crafted file can trigger an out-of-bounds read in _dwarf_get_abbrev_for_code within dwarf_util.c, affecting libdwarf 20161001 and earlier. The official NVD record rates the issue as medium severity and notes that successful triggering requires user interaction with a malicious file.
- Vendor
- Libdwarf Project
- Product
- CVE-2016-8680
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-15
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-15
- Advisory updated
- 2026-05-13
Who should care
Organizations that ship libdwarf or bundle dwarfdump, especially developers, distro maintainers, and teams that process untrusted DWARF files in build, analysis, or support workflows.
Technical summary
According to the official record, _dwarf_get_abbrev_for_code in dwarf_util.c can read outside valid bounds when dwarfdump is run against a crafted input file. NVD maps the weakness to CWE-125 and lists CVSS v3.1 6.5 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H), indicating a remote, user-interaction-dependent availability impact rather than a confidentiality or integrity compromise. The affected version range in the NVD CPE data ends at libdwarf 20161001.
Defensive priority
Medium
Recommended defensive actions
- Upgrade libdwarf to a fixed version newer than 20161001 or apply the vendor patch referenced in the advisory and source diff links.
- Treat dwarfdump and any libdwarf-based parser as untrusted-file processing code; run it only on trusted inputs when possible.
- If you cannot patch immediately, isolate the tool with sandboxing, least privilege, and tight file-access controls.
- Review build pipelines, QA jobs, and support tooling that automatically open customer-supplied DWARF files.
- Verify downstream packages and container images for embedded libdwarf copies and rebuild after applying fixes.
Evidence notes
The official CVE and NVD records identify libdwarf 20161001 and earlier as affected and describe the issue as an out-of-bounds read in _dwarf_get_abbrev_for_code causing denial of service. NVD lists CWE-125 and CVSS v3.1 6.5 with user interaction required. The supplied reference set includes patch-oriented links from oss-security, a Red Hat bug, and a SourceForge diff; one third-party advisory text uses different wording ('heap-based buffer overflow'), but the official NVD classification is the primary basis used here.
Official resources
-
CVE-2016-8680 CVE record
CVE.org
-
CVE-2016-8680 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Exploit, Patch, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
The CVE was published on 2017-02-15, with source references pointing back to October 2016 patch/advisory activity. The provided NVD record was last modified on 2026-05-13.