{"id":"CVE-2019-19725","details":"sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c.","modified":"2026-04-16T04:39:13.642934059Z","published":"2019-12-11T18:16:20.053Z","related":["SUSE-SU-2020:0026-1","SUSE-SU-2020:0026-2","SUSE-SU-2020:1419-1","openSUSE-SU-2020:0736-1","openSUSE-SU-2024:11419-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00014.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202007-22"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4242-1/"},{"type":"REPORT","url":"https://github.com/sysstat/sysstat/issues/242"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sysstat/sysstat","events":[{"introduced":"0"},{"last_affected":"987942f690c83fc4e5f62cebb68993b5a095f136"},{"introduced":"0"},{"last_affected":"da125d82b6b693448e166eb036bb8e12cadbd959"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"12.2.0"},{"introduced":"0"},{"last_affected":"10.0"}]}}],"versions":["11.1.5","v10.0.0","v10.0.1","v10.0.2","v10.0.3","v10.0.4","v10.0.5","v10.1.1","v10.1.2","v10.1.3","v10.1.4","v10.1.5","v10.1.6","v10.1.7","v10.2.0","v10.2.1","v10.3.1","v11.0.0","v11.1.1","v11.1.2","v11.1.3","v11.1.4","v11.1.5","v11.1.6","v11.1.7","v11.1.8","v11.2.0","v11.3.1","v11.3.2","v11.3.3","v11.3.4","v11.3.5","v11.4.0","v11.5.1","v11.5.2","v11.5.3","v11.5.4","v11.5.5","v11.5.6","v11.5.7","v11.6.0","v11.7.1","v11.7.2","v11.7.3","v11.7.4","v12.0.0","v12.1.1","v12.1.2","v12.1.3","v12.1.4","v12.1.5","v12.1.6","v12.1.7","v12.2.0","v9.1.5","v9.1.6","v9.1.7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-19725.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}