2019-01-03 11:05:05 -05:00
{
2019-03-17 22:04:40 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2019-3701" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2019-01-03 11:05:05 -05:00
{
2019-03-17 22:04:40 +00:00
"lang" : "eng" ,
2019-04-24 18:00:44 +00:00
"value" : "An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user \"root\" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames."
2019-01-03 11:05:05 -05:00
}
2019-03-17 22:04:40 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://marc.info/?l=linux-netdev&m=154651842302479&w=2" ,
"refsource" : "MISC" ,
"url" : "https://marc.info/?l=linux-netdev&m=154651842302479&w=2"
} ,
{
"name" : "106443" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/106443"
} ,
{
"name" : "https://bugzilla.suse.com/show_bug.cgi?id=1120386" ,
"refsource" : "MISC" ,
"url" : "https://bugzilla.suse.com/show_bug.cgi?id=1120386"
2019-03-27 19:00:45 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
2019-04-01 21:00:51 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
2019-04-03 01:00:44 +00:00
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-3932-1" ,
"url" : "https://usn.ubuntu.com/3932-1/"
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-3932-2" ,
"url" : "https://usn.ubuntu.com/3932-2/"
2019-04-12 15:00:42 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.f5.com/csp/article/K17957133" ,
"url" : "https://support.f5.com/csp/article/K17957133"
2019-04-24 18:00:44 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://marc.info/?l=linux-netdev&m=154661373531512&w=2" ,
"url" : "https://marc.info/?l=linux-netdev&m=154661373531512&w=2"
} ,
{
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68" ,
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68"
2019-05-03 12:00:52 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html"
2019-09-03 00:00:49 +00:00
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-4115-1" ,
"url" : "https://usn.ubuntu.com/4115-1/"
2019-09-03 00:01:06 +00:00
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-4118-1" ,
"url" : "https://usn.ubuntu.com/4118-1/"
2020-04-23 16:01:19 +00:00
} ,
{
"refsource" : "SUSE" ,
"name" : "openSUSE-SU-2020:0543" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html"
2019-03-17 22:04:40 +00:00
}
]
}
}