CVE-2019-3701

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-3701
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-3701.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-3701
Related
Published
2019-01-03T16:29:00Z
Modified
2024-06-30T12:01:22Z
Severity
  • 4.4 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in cancangwrcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the candlc field. The privileged user "root" with CAPNETADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgwcsumxorrel) the tail of the skb (e.g. fraglist pointer in skbsharedinfo) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.20-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.20-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.20-1

Ecosystem specific

{
    "urgency": "unimportant"
}