CVE-2019-19312

Current Description

In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.

Basic Data

PublishedNovember 22, 2019
Last ModifiedDecember 12, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-476
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score2.1
SeverityLOW
Exploitability Score3.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********5.1

Vulnerable Software List

VendorProductVersions
Linux Linux Kernel *

References

NameSourceURLTags
openSUSE-SU-2019:2675http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.htmlSUSE
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlhttp://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-UpdateMISC
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1MISCRelease Notes Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cchttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910MISCIssue Tracking Patch Vendor Advisory
[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security updatehttps://lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlMLIST
[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security updatehttps://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlMLIST
20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)https://seclists.org/bugtraq/2020/Jan/10BUGTRAQ
https://security.netapp.com/advisory/ntap-20200103-0001/https://security.netapp.com/advisory/ntap-20200103-0001/CONFIRM
USN-4254-1https://usn.ubuntu.com/4254-1/UBUNTU
USN-4254-2https://usn.ubuntu.com/4254-2/UBUNTU
USN-4258-1https://usn.ubuntu.com/4258-1/UBUNTU
USN-4287-1https://usn.ubuntu.com/4287-1/UBUNTU
USN-4287-2https://usn.ubuntu.com/4287-2/UBUNTU