First published: Sat Feb 09 2019(Updated: )
In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Elfutils | =0.175 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7664 has a severity rating that typically qualifies it as a denial of service vulnerability.
To fix CVE-2019-7664, update to a patched version of elfutils beyond 0.175 that addresses this overflow vulnerability.
CVE-2019-7664 affects systems running elfutils version 0.175 and various Red Hat Enterprise Linux versions including 7.0 and 8.0 through 8.6.
CVE-2019-7664 is classified as a memory corruption vulnerability that can lead to a program crash.
Exploitation of CVE-2019-7664 primarily results in denial of service and does not directly lead to data exposure.