vulnerability

Ubuntu: (Multiple Advisories) (CVE-2019-3701): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Jan 3, 2019
Added
Apr 9, 2019
Modified
Aug 18, 2025

Description

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.

Solutions

ubuntu-upgrade-linux-image-4-15-0-1022-oracleubuntu-upgrade-linux-image-4-15-0-1041-gcpubuntu-upgrade-linux-image-4-15-0-1041-gkeubuntu-upgrade-linux-image-4-15-0-1043-kvmubuntu-upgrade-linux-image-4-15-0-1044-raspi2ubuntu-upgrade-linux-image-4-15-0-1047-awsubuntu-upgrade-linux-image-4-15-0-1056-azureubuntu-upgrade-linux-image-4-15-0-60-genericubuntu-upgrade-linux-image-4-15-0-60-generic-lpaeubuntu-upgrade-linux-image-4-15-0-60-lowlatencyubuntu-upgrade-linux-image-4-4-0-1040-awsubuntu-upgrade-linux-image-4-4-0-1043-kvmubuntu-upgrade-linux-image-4-4-0-1079-awsubuntu-upgrade-linux-image-4-4-0-1106-raspi2ubuntu-upgrade-linux-image-4-4-0-1110-snapdragonubuntu-upgrade-linux-image-4-4-0-144-genericubuntu-upgrade-linux-image-4-4-0-144-generic-lpaeubuntu-upgrade-linux-image-4-4-0-144-lowlatencyubuntu-upgrade-linux-image-4-4-0-144-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-144-powerpc-smpubuntu-upgrade-linux-image-4-4-0-144-powerpc64-embubuntu-upgrade-linux-image-4-4-0-144-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-145-genericubuntu-upgrade-linux-image-4-4-0-145-generic-lpaeubuntu-upgrade-linux-image-4-4-0-145-lowlatencyubuntu-upgrade-linux-image-4-4-0-145-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-145-powerpc-smpubuntu-upgrade-linux-image-4-4-0-145-powerpc64-embubuntu-upgrade-linux-image-4-4-0-145-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-4-15ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-lts-xenial
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.