In the Linux kernel, the following vulnerability has been resolved:
can: mcan: mcan_{readfifo,echotx_event}(): shift timestamp to full 32 bits
In commit 1be37d3b0414 ("can: m_can: fix periph RX path: use rx-offload to ensure skbs are sent from softirq context") the RX path for peripheral devices was switched to RX-offload.
Received CAN frames are pushed to RX-offload together with a timestamp. RX-offload is designed to handle overflows of the timestamp correctly, if 32 bit timestamps are provided.
The timestamps of m_can core are only 16 bits wide. So this patch shifts them to full 32 bit before passing them to RX-offload.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49659.json"
}[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49659-23caa739",
"target": {
"file": "drivers/net/can/m_can/m_can.c",
"function": "m_can_echo_tx_event"
},
"digest": {
"length": 718.0,
"function_hash": "79064162121903194633063158894265223534"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a2914a5bd7f38efe55a8372178146de82e0bce9"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49659-390a5bab",
"target": {
"file": "drivers/net/can/m_can/m_can.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"269971702623838695954930060285550620227",
"45799307462549563978751761276310712272",
"71637388844207888667334957875364763974",
"277113333730920787434022508443981336913",
"78813754148373596856339650451520086105",
"147698792095142133877761805802638440671",
"145971990574824511615087530833748631192",
"62478898600044628324738859119994391017"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c3333693f07313f5f0145a922f14a7d3c0f4f21"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49659-6ae97526",
"target": {
"file": "drivers/net/can/m_can/m_can.c",
"function": "m_can_read_fifo"
},
"digest": {
"length": 1483.0,
"function_hash": "228812036135117957489680479659479448827"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a2914a5bd7f38efe55a8372178146de82e0bce9"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49659-6f8c222c",
"target": {
"file": "drivers/net/can/m_can/m_can.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"269971702623838695954930060285550620227",
"45799307462549563978751761276310712272",
"71637388844207888667334957875364763974",
"277113333730920787434022508443981336913",
"78813754148373596856339650451520086105",
"147698792095142133877761805802638440671",
"145971990574824511615087530833748631192",
"62478898600044628324738859119994391017"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a2914a5bd7f38efe55a8372178146de82e0bce9"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49659-71e6ffc4",
"target": {
"file": "drivers/net/can/m_can/m_can.c",
"function": "m_can_read_fifo"
},
"digest": {
"length": 1483.0,
"function_hash": "228421193908233088756666856535379777417"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c7333f79888497bfd75dcd02a94eaf836dd1042c"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2022-49659-9b1c3254",
"target": {
"file": "drivers/net/can/m_can/m_can.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"184439313263024763379840110649622234617",
"184489182774989975525105108519942205447",
"21855153977495740264258715120752326060",
"277113333730920787434022508443981336913",
"78813754148373596856339650451520086105",
"147698792095142133877761805802638440671",
"145971990574824511615087530833748631192",
"62478898600044628324738859119994391017"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c7333f79888497bfd75dcd02a94eaf836dd1042c"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49659-a3a0e4c5",
"target": {
"file": "drivers/net/can/m_can/m_can.c",
"function": "m_can_echo_tx_event"
},
"digest": {
"length": 718.0,
"function_hash": "79064162121903194633063158894265223534"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c3333693f07313f5f0145a922f14a7d3c0f4f21"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49659-a502347b",
"target": {
"file": "drivers/net/can/m_can/m_can.c",
"function": "m_can_read_fifo"
},
"digest": {
"length": 1483.0,
"function_hash": "228812036135117957489680479659479448827"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4c3333693f07313f5f0145a922f14a7d3c0f4f21"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2022-49659-a6ce332e",
"target": {
"file": "drivers/net/can/m_can/m_can.c",
"function": "m_can_echo_tx_event"
},
"digest": {
"length": 718.0,
"function_hash": "79064162121903194633063158894265223534"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c7333f79888497bfd75dcd02a94eaf836dd1042c"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49659.json"