GSD-2022-1004213

Source
https://data.gsd.id/GSD-2022-1004213
Import Source
https://github.com/cloudsecurityalliance/gsd-database/blob/main/2022/1004xxx/GSD-2022-1004213.json
JSON Data
https://api.osv.dev/v1/vulns/GSD-2022-1004213
Published
2022-07-31T13:51:12.920691Z
Modified
2023-02-22T09:12:41.557754Z
Summary
can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits
Details

can: mcan: mcan{readfifo,echotxevent}(): shift timestamp to full 32 bits

This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.18.11 by commit 2a2914a5bd7f38efe55a8372178146de82e0bce9, it was introduced in version v5.13 by commit 1be37d3b0414e3db47f6fcba6c16286bbae0cb65. For more details please see the references link.

References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/
Events
Introduced
1be37d3b0414e3db47f6fcba6c16286bbae0cb65
Limit
2a2914a5bd7f38efe55a8372178146de82e0bce9

Affected versions

v5.*

v5.12
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.10
v5.18.2
v5.18.3
v5.18.4
v5.18.5
v5.18.6
v5.18.7
v5.18.8
v5.18.9