### [CVE-2019-19227](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19227) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122. ### POC #### Reference - http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc - https://usn.ubuntu.com/4254-2/ - https://usn.ubuntu.com/4287-2/ #### Github - https://github.com/MrAgrippa/nes-01