CVE-2019-7149
Published: August 31, 2023Last modified: December 15, 2025
Description
A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.5 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | elfutils | Not affected (0.187-r1) |
| Stream | elfutils | Not affected (0.189-r3) | |
| Hardened Containers | Stream | elfutils | Not affected (0.189-r3) |
References
- https://access.redhat.com/errata/RHSA-2019:2197
- https://access.redhat.com/errata/RHSA-2019:3575
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24102
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
- https://usn.ubuntu.com/4012-1/