ID

VAR-201911-1414


CVE

CVE-2019-19061


TITLE

Linux Kernel Vulnerable to resource exhaustion

Trust: 0.8

sources: JVNDB: JVNDB-2019-011972

DESCRIPTION

A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3. Linux Kernel Contains a resource exhaustion vulnerability. Vendors have confirmed this vulnerability CID-9c0530e898f3 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. ========================================================================== Ubuntu Security Notice USN-4904-1 April 13, 2021 linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-raspi2: Linux kernel for Raspberry Pi (V8) systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: Ben Harris discovered that the Linux kernel would strip extended privilege attributes of files when performing a failed unprivileged system call. A local attacker could use this to cause a denial of service. (CVE-2015-1350) Andrey Konovalov discovered that the video4linux driver for Hauppauge HD PVR USB devices in the Linux kernel did not properly handle some error conditions. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16644) It was discovered that the timer stats implementation in the Linux kernel allowed the discovery of a real PID value while inside a PID namespace. A local attacker could use this to expose sensitive information. (CVE-2017-5967) Wen Xu discovered that the xfs file system implementation in the Linux kernel did not properly validate the number of extents in an inode. An attacker could use this to construct a malicious xfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13095) It was discovered that the Fujitsu ES network device driver for the Linux kernel did not properly check for errors in some situations, leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2019-16231) It was discovered that the Marvell 8xxx Libertas WLAN device driver in the Linux kernel did not properly check for errors in certain situations, leading to a NULL pointer dereference. A local attacker could possibly use this to cause a denial of service. (CVE-2019-16232) It was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel did not properly deallocate memory in certain error conditions. (CVE-2019-19061) It was discovered that a race condition existed in the floppy device driver in the Linux kernel. An attacker with access to the floppy device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-20261) Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan H. Sch\xf6nherr discovered that the Xen paravirtualization bckend in the Linux kernel did not properly propagate errors to frontend drivers in some situations. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2021-26930) Jan Beulich discovered that multiple Xen backends in the Linux kernel did not properly handle certain error conditions under paravirtualization. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2021-26931) Jan Beulich discovered that the Xen netback backend in the Linux kernel did not properly handle certain error conditions under paravirtualization. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2021-28038) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: linux-image-4.4.0-1091-kvm 4.4.0-1091.100 linux-image-4.4.0-1126-aws 4.4.0-1126.140 linux-image-4.4.0-1150-raspi2 4.4.0-1150.161 linux-image-4.4.0-1154-snapdragon 4.4.0-1154.164 linux-image-4.4.0-208-generic 4.4.0-208.240 linux-image-4.4.0-208-generic-lpae 4.4.0-208.240 linux-image-4.4.0-208-lowlatency 4.4.0-208.240 linux-image-4.4.0-208-powerpc-e500mc 4.4.0-208.240 linux-image-4.4.0-208-powerpc-smp 4.4.0-208.240 linux-image-4.4.0-208-powerpc64-emb 4.4.0-208.240 linux-image-4.4.0-208-powerpc64-smp 4.4.0-208.240 linux-image-aws 4.4.0.1126.131 linux-image-generic 4.4.0.208.214 linux-image-generic-lpae 4.4.0.208.214 linux-image-kvm 4.4.0.1091.89 linux-image-lowlatency 4.4.0.208.214 linux-image-powerpc-e500mc 4.4.0.208.214 linux-image-powerpc-smp 4.4.0.208.214 linux-image-powerpc64-emb 4.4.0.208.214 linux-image-powerpc64-smp 4.4.0.208.214 linux-image-raspi2 4.4.0.1150.150 linux-image-snapdragon 4.4.0.1154.146 linux-image-virtual 4.4.0.208.214 Ubuntu 14.04 ESM: linux-image-4.4.0-1090-aws 4.4.0-1090.94 linux-image-4.4.0-208-generic 4.4.0-208.240~14.04.1 linux-image-4.4.0-208-generic-lpae 4.4.0-208.240~14.04.1 linux-image-4.4.0-208-lowlatency 4.4.0-208.240~14.04.1 linux-image-aws 4.4.0.1090.87 linux-image-generic-lpae-lts-xenial 4.4.0.208.181 linux-image-generic-lts-xenial 4.4.0.208.181 linux-image-lowlatency-lts-xenial 4.4.0.208.181 linux-image-virtual-lts-xenial 4.4.0.208.181 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-4904-1 CVE-2015-1350, CVE-2017-16644, CVE-2017-5967, CVE-2018-13095, CVE-2019-16231, CVE-2019-16232, CVE-2019-19061, CVE-2021-20261, CVE-2021-26930, CVE-2021-26931, CVE-2021-28038 Package Information: https://launchpad.net/ubuntu/+source/linux/4.4.0-208.240 https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1126.140 https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1091.100 https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1150.161 https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1154.164

Trust: 1.98

sources: NVD: CVE-2019-19061 // JVNDB: JVNDB-2019-011972 // VULHUB: VHN-151470 // VULMON: CVE-2019-19061 // PACKETSTORM: 162163 // PACKETSTORM: 159250

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:ltversion:5.3.9

Trust: 1.8

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.30

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60.3

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.262

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.137

Trust: 1.0

vendor:broadcommodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.9

Trust: 1.0

vendor:netappmodel:data availability servicesscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.40.5

Trust: 1.0

vendor:netappmodel:fas\/aff baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.40

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.70.1

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:netappmodel:solidfire\, enterprise sds \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:aff baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:steelstore cloud integrated storagescope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.30.5r3

Trust: 1.0

vendor:netappmodel:solidfire \& hci management nodescope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.192

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.50.1

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60.1

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.0

Trust: 1.0

vendor:netappmodel:hci baseboard management controllerscope:eqversion:h610s

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.262

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.40.3r2

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.50.2

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.60.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.70.2

Trust: 1.0

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.20

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.25

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:eqversion:11.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

sources: JVNDB: JVNDB-2019-011972 // NVD: CVE-2019-19061

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-19061
value: HIGH

Trust: 1.0

NVD: CVE-2019-19061
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201911-1080
value: HIGH

Trust: 0.6

VULHUB: VHN-151470
value: HIGH

Trust: 0.1

VULMON: CVE-2019-19061
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-19061
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-151470
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-19061
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-19061
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-151470 // VULMON: CVE-2019-19061 // JVNDB: JVNDB-2019-011972 // CNNVD: CNNVD-201911-1080 // NVD: CVE-2019-19061

PROBLEMTYPE DATA

problemtype:CWE-401

Trust: 1.1

problemtype:CWE-400

Trust: 0.8

sources: VULHUB: VHN-151470 // JVNDB: JVNDB-2019-011972 // NVD: CVE-2019-19061

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201911-1080

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201911-1080

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-011972

PATCH

title:ChangeLog-5.3.9url:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9

Trust: 0.8

title:iio: imu: adis16400: fix memory leakurl:https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873

Trust: 0.8

title:Linux Kernel Archivesurl:http://www.kernel.org

Trust: 0.8

title:Linux kernel Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=103000

Trust: 0.6

title:Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-kvm, linux-oracle vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4208-1

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1480url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1480

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2019-19061

Trust: 0.1

sources: VULMON: CVE-2019-19061 // JVNDB: JVNDB-2019-011972 // CNNVD: CNNVD-201911-1080

EXTERNAL IDS

db:NVDid:CVE-2019-19061

Trust: 2.8

db:PACKETSTORMid:162163

Trust: 0.8

db:JVNDBid:JVNDB-2019-011972

Trust: 0.8

db:CNNVDid:CNNVD-201911-1080

Trust: 0.7

db:AUSCERTid:ESB-2019.4537

Trust: 0.6

db:AUSCERTid:ESB-2021.1228

Trust: 0.6

db:AUSCERTid:ESB-2020.3235

Trust: 0.6

db:AUSCERTid:ESB-2020.3269

Trust: 0.6

db:PACKETSTORMid:159250

Trust: 0.2

db:VULHUBid:VHN-151470

Trust: 0.1

db:VULMONid:CVE-2019-19061

Trust: 0.1

sources: VULHUB: VHN-151470 // VULMON: CVE-2019-19061 // JVNDB: JVNDB-2019-011972 // PACKETSTORM: 162163 // PACKETSTORM: 159250 // CNNVD: CNNVD-201911-1080 // NVD: CVE-2019-19061

REFERENCES

url:https://usn.ubuntu.com/4208-1/

Trust: 2.5

url:https://security.netapp.com/advisory/ntap-20191205-0001/

Trust: 1.8

url:https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.3.9

Trust: 1.8

url:https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873

Trust: 1.8

url:https://usn.ubuntu.com/4526-1/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-19061

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19061

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-19061

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-five-vulnerabilities-via-memory-leak-30908

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4537/

Trust: 0.6

url:https://packetstormsecurity.com/files/162163/ubuntu-security-notice-usn-4904-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1228

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3269/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3235/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/401.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2019-19061

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5967

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1350

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4904-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1126.140

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1150.161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16644

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28038

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26931

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1091.100

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1154.164

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-208.240

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13095

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19054

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12888

Trust: 0.1

url:https://usn.ubuntu.com/4526-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1083.87~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1083.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1070.73

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-118.119

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19067

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1054.58~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1087.95

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1096.106

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1084.95~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1054.58

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1097.107

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1084.95

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1071.75

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9445

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14356

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1096.106~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-118.119~16.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18808

Trust: 0.1

sources: VULHUB: VHN-151470 // VULMON: CVE-2019-19061 // JVNDB: JVNDB-2019-011972 // PACKETSTORM: 162163 // PACKETSTORM: 159250 // CNNVD: CNNVD-201911-1080 // NVD: CVE-2019-19061

CREDITS

Ubuntu

Trust: 0.8

sources: PACKETSTORM: 162163 // PACKETSTORM: 159250 // CNNVD: CNNVD-201911-1080

SOURCES

db:VULHUBid:VHN-151470
db:VULMONid:CVE-2019-19061
db:JVNDBid:JVNDB-2019-011972
db:PACKETSTORMid:162163
db:PACKETSTORMid:159250
db:CNNVDid:CNNVD-201911-1080
db:NVDid:CVE-2019-19061

LAST UPDATE DATE

2024-11-23T21:06:08.899000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-151470date:2023-01-19T00:00:00
db:VULMONid:CVE-2019-19061date:2022-11-08T00:00:00
db:JVNDBid:JVNDB-2019-011972date:2019-11-21T00:00:00
db:CNNVDid:CNNVD-201911-1080date:2021-04-15T00:00:00
db:NVDid:CVE-2019-19061date:2024-11-21T04:34:06.290

SOURCES RELEASE DATE

db:VULHUBid:VHN-151470date:2019-11-18T00:00:00
db:VULMONid:CVE-2019-19061date:2019-11-18T00:00:00
db:JVNDBid:JVNDB-2019-011972date:2019-11-21T00:00:00
db:PACKETSTORMid:162163date:2021-04-13T20:22:22
db:PACKETSTORMid:159250date:2020-09-22T18:21:40
db:CNNVDid:CNNVD-201911-1080date:2019-11-18T00:00:00
db:NVDid:CVE-2019-19061date:2019-11-18T06:15:12.403