{"id":"CVE-2019-7665","details":"In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.","modified":"2026-04-02T02:07:54.772349Z","published":"2019-02-09T16:29:00.420Z","related":["MGASA-2019-0222","SUSE-SU-2019:1486-1","SUSE-SU-2019:1733-1","SUSE-SU-2022:2614-1","SUSE-SU-2022:2614-2","openSUSE-SU-2019:1590-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/4012-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2197"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3575"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"},{"type":"REPORT","url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24089"},{"type":"EVIDENCE","url":"https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/elfutils.git","events":[{"introduced":"0"},{"last_affected":"4ea9a2db164caadf836a65d5cdffb09a2d5a37ce"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.175"}]}}],"versions":["dts-0.159","dts-0.161","dts-0.168","dts-0.169","dts-0.170","dts-0.173","dts-0.174","elfutils-0.120","elfutils-0.121","elfutils-0.122","elfutils-0.123","elfutils-0.124","elfutils-0.125","elfutils-0.126","elfutils-0.127","elfutils-0.128","elfutils-0.129","elfutils-0.130","elfutils-0.131","elfutils-0.132","elfutils-0.133","elfutils-0.134","elfutils-0.135","elfutils-0.136","elfutils-0.137","elfutils-0.138","elfutils-0.139","elfutils-0.140","elfutils-0.141","elfutils-0.142","elfutils-0.143","elfutils-0.144","elfutils-0.145","elfutils-0.146","elfutils-0.147","elfutils-0.148","elfutils-0.149","elfutils-0.150","elfutils-0.151","elfutils-0.152","elfutils-0.153","elfutils-0.154","elfutils-0.155","elfutils-0.156","elfutils-0.157","elfutils-0.158","elfutils-0.159","elfutils-0.160","elfutils-0.161","elfutils-0.162","elfutils-0.163","elfutils-0.164","elfutils-0.165","elfutils-0.166","elfutils-0.167","elfutils-0.168","elfutils-0.169","elfutils-0.170","elfutils-0.171","elfutils-0.172","elfutils-0.173","elfutils-0.174","elfutils-0.175"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-7665.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}