CVE-2022-49659
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
22/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits<br />
<br />
In commit 1be37d3b0414 ("can: m_can: fix periph RX path: use<br />
rx-offload to ensure skbs are sent from softirq context") the RX path<br />
for peripheral devices was switched to RX-offload.<br />
<br />
Received CAN frames are pushed to RX-offload together with a<br />
timestamp. RX-offload is designed to handle overflows of the timestamp<br />
correctly, if 32 bit timestamps are provided.<br />
<br />
The timestamps of m_can core are only 16 bits wide. So this patch<br />
shifts them to full 32 bit before passing them to RX-offload.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.15.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



