First published: Tue Jan 29 2019(Updated: )
A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/elfutils | 0.183-1 0.188-2.1 0.192-4 | |
CentOS Elfutils | =0.175 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7149 has a medium severity rating due to its potential to cause denial-of-service through segmentation faults.
To fix CVE-2019-7149, upgrade libdw in elfutils to versions 0.183-1, 0.188-2.1, or 0.192-4 or later.
CVE-2019-7149 is a heap-based buffer over-read vulnerability.
CVE-2019-7149 affects elfutils version 0.175 and specific Debian Linux distributions.
The potential impacts of CVE-2019-7149 include application crashes and denial-of-service conditions.