Логотип exploitDog
bind:CVE-2019-3701
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-3701

Количество 21

Количество 21

ubuntu логотип

CVE-2019-3701

больше 6 лет назад

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
EPSS: Низкий
redhat логотип

CVE-2019-3701

больше 6 лет назад

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2019-3701

больше 6 лет назад

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2019-3701

больше 6 лет назад

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux ...

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-28gp-589x-6r7f

около 3 лет назад

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
EPSS: Низкий
fstec логотип

BDU:2020-00842

больше 6 лет назад

Уязвимость в функции can_can_gw_rcv in net/can/gw.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.4
EPSS: Низкий
oracle-oval логотип

ELSA-2019-4596

около 6 лет назад

ELSA-2019-4596: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4600

около 6 лет назад

ELSA-2019-4600: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0543-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1146-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4612

около 6 лет назад

ELSA-2019-4612: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1141-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1119-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1085-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1084-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1118-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1087-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1142-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1275-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1663-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-3701

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-3701

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-3701

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-3701

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux ...

CVSS3: 4.4
0%
Низкий
больше 6 лет назад
github логотип
GHSA-28gp-589x-6r7f

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

CVSS3: 4.4
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-00842

Уязвимость в функции can_can_gw_rcv in net/can/gw.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 4.4
0%
Низкий
больше 6 лет назад
oracle-oval логотип
ELSA-2019-4596

ELSA-2019-4596: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
oracle-oval логотип
ELSA-2019-4600

ELSA-2019-4600: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0543-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1146-1

Security update for the Linux Kernel

около 5 лет назад
oracle-oval логотип
ELSA-2019-4612

ELSA-2019-4612: Unbreakable Enterprise kernel security update (IMPORTANT)

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:1141-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1119-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1085-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1084-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1118-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1087-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1142-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1275-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1663-1

Security update for the Linux Kernel

около 5 лет назад

Уязвимостей на страницу