CVE-2022-49659

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
22/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits<br /> <br /> In commit 1be37d3b0414 ("can: m_can: fix periph RX path: use<br /> rx-offload to ensure skbs are sent from softirq context") the RX path<br /> for peripheral devices was switched to RX-offload.<br /> <br /> Received CAN frames are pushed to RX-offload together with a<br /> timestamp. RX-offload is designed to handle overflows of the timestamp<br /> correctly, if 32 bit timestamps are provided.<br /> <br /> The timestamps of m_can core are only 16 bits wide. So this patch<br /> shifts them to full 32 bit before passing them to RX-offload.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 5.15.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.11 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*