ID

VAR-201902-0242


CVE

CVE-2019-6974


TITLE

Linux kernel Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

DESCRIPTION

In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. ========================================================================== Ubuntu Security Notice USN-3930-2 April 02, 2019 linux-hwe, linux-azure vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: USN-3930-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.10 for Ubuntu 18.04 LTS. Mathias Payer and Hui Peng discovered a use-after-free vulnerability in the Advanced Linux Sound Architecture (ALSA) subsystem. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2018-19824) Shlomi Oberman, Yuli Shapiro, and Ran Menscher discovered an information leak in the Bluetooth implementation of the Linux kernel. An attacker within Bluetooth range could use this to expose sensitive information (kernel memory). (CVE-2019-3459, CVE-2019-3460) Jann Horn discovered that the KVM implementation in the Linux kernel contained a use-after-free vulnerability. An attacker in a guest VM with access to /dev/kvm could use this to cause a denial of service (guest VM crash). (CVE-2019-6974) Jim Mattson and Felix Wilhelm discovered a use-after-free vulnerability in the KVM subsystem of the Linux kernel, when using nested virtual machines. A local attacker in a guest VM could use this to cause a denial of service (system crash) or possibly execute arbitrary code in the host system. (CVE-2019-7221) Felix Wilhelm discovered that an information leak vulnerability existed in the KVM subsystem of the Linux kernel, when nested virtualization is used. A local attacker could use this to expose sensitive information (host system memory to a guest VM). (CVE-2019-7222) Jann Horn discovered that the eBPF implementation in the Linux kernel was insufficiently hardened against Spectre V1 attacks. A local attacker could use this to expose sensitive information. (CVE-2019-7308) It was discovered that a use-after-free vulnerability existed in the user- space API for crypto (af_alg) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-8912) Jakub Jirasek discovered a use-after-free vulnerability in the SCTP implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-8956) It was discovered that the Linux kernel did not properly deallocate memory when handling certain errors while reading files. A local attacker could use this to cause a denial of service (excessive memory consumption). (CVE-2019-8980) It was discovered that a use-after-free vulnerability existed in the IPMI implementation in the Linux kernel. A local attacker with access to the IPMI character device files could use this to cause a denial of service (system crash). (CVE-2019-9003) Jann Horn discovered that the SNMP NAT implementation in the Linux kernel performed insufficient ASN.1 length checks. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-9162) Jann Horn discovered that the mmap implementation in the Linux kernel did not properly check for the mmap minimum address in some situations. A local attacker could use this to assist exploiting a kernel NULL pointer dereference vulnerability. (CVE-2019-9213) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.18.0-1014-azure 4.18.0-1014.14~18.04.1 linux-image-4.18.0-17-generic 4.18.0-17.18~18.04.1 linux-image-4.18.0-17-generic-lpae 4.18.0-17.18~18.04.1 linux-image-4.18.0-17-lowlatency 4.18.0-17.18~18.04.1 linux-image-4.18.0-17-snapdragon 4.18.0-17.18~18.04.1 linux-image-azure 4.18.0.1014.13 linux-image-generic-hwe-18.04 4.18.0.17.67 linux-image-generic-lpae-hwe-18.04 4.18.0.17.67 linux-image-lowlatency-hwe-18.04 4.18.0.17.67 linux-image-snapdragon-hwe-18.04 4.18.0.17.67 linux-image-virtual-hwe-18.04 4.18.0.17.67 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://usn.ubuntu.com/usn/usn-3930-2 https://usn.ubuntu.com/usn/usn-3930-1 CVE-2018-19824, CVE-2019-3459, CVE-2019-3460, CVE-2019-6974, CVE-2019-7221, CVE-2019-7222, CVE-2019-7308, CVE-2019-8912, CVE-2019-8956, CVE-2019-8980, CVE-2019-9003, CVE-2019-9162, CVE-2019-9213 Package Information: https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1014.14~18.04.1 https://launchpad.net/ubuntu/+source/linux-hwe/4.18.0-17.18~18.04.1 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2019:0833-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:0833 Issue date: 2019-04-23 CVE Names: CVE-2019-6974 CVE-2019-7221 ==================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974) * Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer (CVE-2019-7221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * VM hangs on RHEL rt-kernel and OSP 13 [rhel-7.6.z] (BZ#1688673) * kernel-rt: update to the RHEL7.6.z batch#4 source tree (BZ#1689417) Users of kernel are advised to upgrade to these updated packages, which fix these bugs. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1671904 - CVE-2019-7221 Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer 1671913 - CVE-2019-6974 Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() 1688673 - VM hangs on RHEL rt-kernel and OSP 13 [rhel-7.6.z] 1689417 - kernel-rt: update to the RHEL7.6.z batch#4 source tree 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-957.12.1.rt56.927.el7.src.rpm noarch: kernel-rt-doc-3.10.0-957.12.1.rt56.927.el7.noarch.rpm x86_64: kernel-rt-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-devel-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-kvm-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-957.12.1.rt56.927.el7.src.rpm noarch: kernel-rt-doc-3.10.0-957.12.1.rt56.927.el7.noarch.rpm x86_64: kernel-rt-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-devel-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-957.12.1.rt56.927.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXL8MhtzjgjWX9erEAQhtaRAAgTMIiG/eAvfPFp+pWN1HraVwiT1ff/dK /0HALQW/u8O/CBnKPPsUKrDQZT5Z43x4wij6dR5AFlgRI0bwxYnixH1T/oxBkID1 kJcKWwuBnyv6Pxlhd5gxRNeZs0EKCATk/bnI+6NnUFfutt2IIZm9xDOA6HcgK8pp JoLey3Z30Zjapetf+KXWeAotaEj455dNBr6mUwQZRN9nD3q8BBj53tSWKhcgGlFY 2zWg4Fc6TYnpfrGzvVR+6fuY8u4VmpOOtvztB854GaXm9NkJ+Q28pygu0TmRMzUS xprTzEEO2SZpheZybDH0f6H5DemOW39rktf1p/cbb6Pc2eOFC3C3BlVZQ+k8pVax FLVvvSh81t5XIxrvrogjSvY6p6vVvbF3vV8NXcNhC3HEIoAEu7umsE23M4h8prCx PrTyVv1YgGhrJ15LHBmNpMlKT8LsuguZKnC8z5Q36K/VsQrAtnQhcz+UCl851Dr6 ETd03PIKwHR+KKR4l/BLxIGDl2RhbsKYadY0uBQVFZBuH06kk3TA3fpu43CsNDX8 9shR2jY6BBiJtTFY0mTHy43y4TKtydxivAlufk8hb9yuY1D0p0sjKkMFvSqCMBP/ /gUW3bMXSr6l2Bge27TDw0v5vylfIz1nbsBhzWfNHSoEPSO3UT3ttCZziSR/koKl E3Pf5ET0wjAP+ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . M. 7) - aarch64, noarch, ppc64le 3. Bug Fix(es): * [kernel-alt]: BUG: unable to handle kernel NULL pointer IP: crypto_remove_spawns+0x118/0x2e0 (BZ#1536967) * [HPE Apache] update ssif max_xmit_msg_size limit for multi-part messages (BZ#1610534) * RHEL-Alt-7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1673613) * RHEL-Alt-7.6 - s390: sha3_generic module fails and triggers panic when in FIPS mode (BZ#1673979) * RHEL-Alt-7.6 - System crashed after oom - During ICP deployment (BZ#1710304) * kernel-alt: Race condition in hashtables [rhel-alt-7.6.z] (BZ#1712127) * RHEL-Alt-7.6 - OP930:PM_Test:cpupower -r command set values for first 3 cores in quad and misses last core. (CORAL) (BZ#1717836) * RHEL-Alt-7.6 - disable runtime NUMA remapping for PRRN/LPM/VPHN (BZ#1717906) * fragmented packets timing out (BZ#1729066) * Backport TCP follow-up for small buffers (BZ#1733617) Enhancement(s): * RHEL-Alt-7.6 - perfevent PMDA cannot create file descriptors for reading nest events using the perf API (pcp/kernel) (CORAL) (BZ#1723036) 4

Trust: 1.8

sources: NVD: CVE-2019-6974 // VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // PACKETSTORM: 152369 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152593 // PACKETSTORM: 152380 // PACKETSTORM: 152373 // PACKETSTORM: 152374 // PACKETSTORM: 154553

AFFECTED PRODUCTS

vendor:f5model:big-ip webacceleratorscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:ltversion:15.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.10

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.156

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:ltversion:15.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.10

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:ltversion:15.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.6

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.18.136

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:ltversion:15.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.21

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.64

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.20.8

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:13.1.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:redhatmodel:openshift container platformscope:eqversion:3.11

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.176

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:ltversion:15.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.99

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:ltversion:15.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:ltversion:15.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.19

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.1

Trust: 1.0

sources: NVD: CVE-2019-6974

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6974
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201902-612
value: HIGH

Trust: 0.6

VULHUB: VHN-158409
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-6974
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-6974
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-158409
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-6974
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.1

problemtype:CWE-416

Trust: 1.0

sources: VULHUB: VHN-158409 // NVD: CVE-2019-6974

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201902-612

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974

PATCH

title:Linux kernel Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89404

Trust: 0.6

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20190818 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20190833 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200103 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2019-6974url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2019-6974

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193967 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2019-6974

Trust: 0.1

title:Amazon Linux AMI: ALAS-2019-1165url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2019-1165

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1165url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1165

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3933-1

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM QRadar Network Security is affected by Linux kernel vulnerabilities (CVE-2019-7221, CVE-2019-6974, CVE-2018-17972, CVE-2018-9568)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3834ad0670b59206d9d7424b96a80d4a

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3933-2

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-aws-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3931-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3931-1

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3930-1

Trust: 0.1

title:Ubuntu Security Notice: linux-hwe, linux-azure vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3930-2

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - April 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=0cf12ffad0c479958deb0741d0970b4e

Trust: 0.1

title:Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3932-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3932-1

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerabilities in the Linux Kernel affect PowerKVMurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3e8fb0a522dbdc0368aab05e3c3fb62c

Trust: 0.1

title:Paper310url:https://github.com/Sec20-Paper310/Paper310

Trust: 0.1

title:cve_diff_checkerurl:https://github.com/lcatro/cve_diff_checker

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

sources: VULMON: CVE-2019-6974 // CNNVD: CNNVD-201902-612

EXTERNAL IDS

db:NVDid:CVE-2019-6974

Trust: 2.6

db:BIDid:107127

Trust: 1.8

db:EXPLOIT-DBid:46388

Trust: 1.8

db:PACKETSTORMid:151690

Trust: 0.7

db:CNNVDid:CNNVD-201902-612

Trust: 0.7

db:PACKETSTORMid:155466

Trust: 0.6

db:PACKETSTORMid:155951

Trust: 0.6

db:AUSCERTid:ESB-2019.0675

Trust: 0.6

db:AUSCERTid:ESB-2019.0927.3

Trust: 0.6

db:AUSCERTid:ESB-2020.0151

Trust: 0.6

db:AUSCERTid:ESB-2019.4349

Trust: 0.6

db:AUSCERTid:ESB-2019.4486

Trust: 0.6

db:PACKETSTORMid:152593

Trust: 0.2

db:PACKETSTORMid:152598

Trust: 0.1

db:VULHUBid:VHN-158409

Trust: 0.1

db:VULMONid:CVE-2019-6974

Trust: 0.1

db:PACKETSTORMid:152369

Trust: 0.1

db:PACKETSTORMid:152375

Trust: 0.1

db:PACKETSTORMid:152370

Trust: 0.1

db:PACKETSTORMid:152380

Trust: 0.1

db:PACKETSTORMid:152373

Trust: 0.1

db:PACKETSTORMid:152374

Trust: 0.1

db:PACKETSTORMid:154553

Trust: 0.1

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // PACKETSTORM: 152369 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152593 // PACKETSTORM: 152380 // PACKETSTORM: 152373 // PACKETSTORM: 152374 // PACKETSTORM: 154553 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

REFERENCES

url:http://www.securityfocus.com/bid/107127

Trust: 2.4

url:https://support.f5.com/csp/article/k11186236

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:3967

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2020:0103

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:0818

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:0833

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:2809

Trust: 1.9

url:https://usn.ubuntu.com/3933-1/

Trust: 1.9

url:https://www.exploit-db.com/exploits/46388/

Trust: 1.8

url:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9

Trust: 1.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.19.21

Trust: 1.8

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.20.8

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html

Trust: 1.8

url:https://access.redhat.com/errata/rhba-2019:0959

Trust: 1.8

url:https://usn.ubuntu.com/3930-1/

Trust: 1.8

url:https://usn.ubuntu.com/3930-2/

Trust: 1.8

url:https://usn.ubuntu.com/3931-1/

Trust: 1.8

url:https://usn.ubuntu.com/3931-2/

Trust: 1.8

url:https://usn.ubuntu.com/3932-1/

Trust: 1.8

url:https://usn.ubuntu.com/3932-2/

Trust: 1.8

url:https://usn.ubuntu.com/3933-2/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-6974

Trust: 1.4

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1765

Trust: 1.2

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.14.99

Trust: 1.2

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.9.156

Trust: 1.2

url:https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9

Trust: 1.2

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.1

url:https://access.redhat.com/security/cve/cve-2019-6974

Trust: 0.8

url:https://www.exploit-db.com/exploits/46388

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-9213

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-7221

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-7222

Trust: 0.6

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&utm_medium=rss

Trust: 0.6

url:https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9exploitpatchthird party advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.9.156vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.20.8vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.19.21vendor advisory

Trust: 0.6

url:https://cdn.kernel.org/pub/linux/kernel/v4.x/changelog-4.14.99vendor advisory

Trust: 0.6

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1765exploitmailing listpatchthird party advisory

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190683-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20190541-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0151/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77542

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4349/

Trust: 0.6

url:https://packetstormsecurity.com/files/155951/red-hat-security-advisory-2020-0103-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76474

Trust: 0.6

url:https://packetstormsecurity.com/files/151690/linux-kvm/ioctl/create/device-reference-flow-failure.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-privilege-escalation-via-kvm-ioctl-create-device-28494

Trust: 0.6

url:https://packetstormsecurity.com/files/155466/red-hat-security-advisory-2019-3967-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4486/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-19824

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-7308

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8912

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8980

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-3460

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-9162

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8956

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-9003

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3930-1

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-18021

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-14678

Trust: 0.2

url:https://usn.ubuntu.com/usn/usn-3931-1

Trust: 0.2

url:https://support.f5.com/csp/article/k11186236?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/362.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=59645

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/sec20-paper310/paper310

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.18.0-1008.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1014.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.18.0-1012.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.18.0-17.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.18.0-1011.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.18.0-1009.9

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14610

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3819

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-145.171

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14616

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3932-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1106.114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18249

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14614

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3701

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14612

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1043.49

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-9517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16884

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1079.89

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14613

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1110.115

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1014.14~18.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3930-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.18.0-17.18~18.04.1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-7221

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3933-1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3933-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18360

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000410

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1035.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1033.35

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1031.31

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-47.50

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1035.37

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1029.31

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1010.12

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1041.45

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1029.31~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1035.37~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-47.50~16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3931-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1010.12~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1041.45~14.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5489

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5489

Trust: 0.1

sources: VULHUB: VHN-158409 // VULMON: CVE-2019-6974 // PACKETSTORM: 152369 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152593 // PACKETSTORM: 152380 // PACKETSTORM: 152373 // PACKETSTORM: 152374 // PACKETSTORM: 154553 // CNNVD: CNNVD-201902-612 // NVD: CVE-2019-6974

CREDITS

Ubuntu

Trust: 0.6

sources: PACKETSTORM: 152369 // PACKETSTORM: 152375 // PACKETSTORM: 152370 // PACKETSTORM: 152380 // PACKETSTORM: 152373 // PACKETSTORM: 152374

SOURCES

db:VULHUBid:VHN-158409
db:VULMONid:CVE-2019-6974
db:PACKETSTORMid:152369
db:PACKETSTORMid:152375
db:PACKETSTORMid:152370
db:PACKETSTORMid:152593
db:PACKETSTORMid:152380
db:PACKETSTORMid:152373
db:PACKETSTORMid:152374
db:PACKETSTORMid:154553
db:CNNVDid:CNNVD-201902-612
db:NVDid:CVE-2019-6974

LAST UPDATE DATE

2024-11-12T21:12:26.874000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158409date:2020-10-15T00:00:00
db:VULMONid:CVE-2019-6974date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201902-612date:2022-04-06T00:00:00
db:NVDid:CVE-2019-6974date:2023-11-07T03:13:16.310

SOURCES RELEASE DATE

db:VULHUBid:VHN-158409date:2019-02-15T00:00:00
db:VULMONid:CVE-2019-6974date:2019-02-15T00:00:00
db:PACKETSTORMid:152369date:2019-04-03T17:11:08
db:PACKETSTORMid:152375date:2019-04-03T17:14:29
db:PACKETSTORMid:152370date:2019-04-03T17:11:24
db:PACKETSTORMid:152593date:2019-04-23T16:28:16
db:PACKETSTORMid:152380date:2019-04-03T17:18:08
db:PACKETSTORMid:152373date:2019-04-03T17:13:58
db:PACKETSTORMid:152374date:2019-04-03T17:14:13
db:PACKETSTORMid:154553date:2019-09-20T15:08:09
db:CNNVDid:CNNVD-201902-612date:2019-02-07T00:00:00
db:NVDid:CVE-2019-6974date:2019-02-15T15:29:00.250