๐Ÿ” CVE Alert

CVE-2022-49659

UNKNOWN 0.0

can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits In commit 1be37d3b0414 ("can: m_can: fix periph RX path: use rx-offload to ensure skbs are sent from softirq context") the RX path for peripheral devices was switched to RX-offload. Received CAN frames are pushed to RX-offload together with a timestamp. RX-offload is designed to handle overflows of the timestamp correctly, if 32 bit timestamps are provided. The timestamps of m_can core are only 16 bits wide. So this patch shifts them to full 32 bit before passing them to RX-offload.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1be37d3b0414e3db47f6fcba6c16286bbae0cb65 < c7333f79888497bfd75dcd02a94eaf836dd1042c 1be37d3b0414e3db47f6fcba6c16286bbae0cb65 < 2a2914a5bd7f38efe55a8372178146de82e0bce9 1be37d3b0414e3db47f6fcba6c16286bbae0cb65 < 4c3333693f07313f5f0145a922f14a7d3c0f4f21
Linux / Linux
5.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c7333f79888497bfd75dcd02a94eaf836dd1042c git.kernel.org: https://git.kernel.org/stable/c/2a2914a5bd7f38efe55a8372178146de82e0bce9 git.kernel.org: https://git.kernel.org/stable/c/4c3333693f07313f5f0145a922f14a7d3c0f4f21