CVE-2026-23362
UNKNOWN
NVD
CVSS Score
0
Severity
UNKNOWN
Published
Mar 25, 2026
Vendor
unknown
Description
In the Linux kernel, the following vulnerability has been resolved: can: bcm: fix locking for bcm_op runtime updates Commit c2aba69d0c36 ("can: bcm: add locking for bcm_op runtime updates") added a locking for some variables that can be modified at runtime when updating the sending bcm_op with a new TX_SETUP command in bcm_tx_setup(). Usually the RX_SETUP only handles and filters incoming traffic with one exception: When the RX_RTR_FRAME flag is set a predefined CAN frame is sent when a specific RTR frame is received. Therefore the rx bcm_op uses bcm_can_tx() which uses the bcm_tx_lock that was only initialized in bcm_tx_setup(). Add the missing spin_lock_init() when allocating the bcm_op in bcm_rx_setup() to handle the RTR case properly.
References
- https://git.kernel.org/stable/c/70e951afad4c025261fe3c952d2b07237e320a01
- https://git.kernel.org/stable/c/800f26f11ae37b17f58e0001f28a47dd75c26557
- https://git.kernel.org/stable/c/8215ba7bc99e84e66fd6938874ec4330a9d96518
- https://git.kernel.org/stable/c/8bcf2d847adb82b2c617456f6da17ac5e6c75285
- https://git.kernel.org/stable/c/c35636e91e392e1540949bbc67932167cb48bc3a