CVE-2026-23362 PUBLISHED

can: bcm: fix locking for bcm_op runtime updates

Assigner: Linux
Reserved: 13.01.2026 Published: 25.03.2026 Updated: 25.03.2026

In the Linux kernel, the following vulnerability has been resolved:

can: bcm: fix locking for bcm_op runtime updates

Commit c2aba69d0c36 ("can: bcm: add locking for bcm_op runtime updates") added a locking for some variables that can be modified at runtime when updating the sending bcm_op with a new TX_SETUP command in bcm_tx_setup().

Usually the RX_SETUP only handles and filters incoming traffic with one exception: When the RX_RTR_FRAME flag is set a predefined CAN frame is sent when a specific RTR frame is received. Therefore the rx bcm_op uses bcm_can_tx() which uses the bcm_tx_lock that was only initialized in bcm_tx_setup(). Add the missing spin_lock_init() when allocating the bcm_op in bcm_rx_setup() to handle the RTR case properly.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 2a437b86ac5a9893c902f30ef66815bf13587bf6 to 800f26f11ae37b17f58e0001f28a47dd75c26557 (excl.)
  • affected from 76c84c3728178b2d38d5604e399dfe8b0752645e to 70e951afad4c025261fe3c952d2b07237e320a01 (excl.)
  • affected from cc55dd28c20a6611e30596019b3b2f636819a4c0 to 8bcf2d847adb82b2c617456f6da17ac5e6c75285 (excl.)
  • affected from c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7 to 8215ba7bc99e84e66fd6938874ec4330a9d96518 (excl.)
  • affected from c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7 to f0c349b2c21b220af5ba19f29b885e222958d796 (excl.)
  • affected from c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7 to c35636e91e392e1540949bbc67932167cb48bc3a (excl.)
  • Version 8f1c022541bf5a923c8d6fa483112c15250f30a4 is affected
  • Version 7595de7bc56e0e52b74e56c90f7e247bf626d628 is affected
  • Version fbd8fdc2b218e979cfe422b139b8f74c12419d1f is affected
  • Version c4e8a172501e677ebd8ea9d9161d97dc4df56fbd is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.15 is affected
  • unaffected from 0 to 6.15 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.77 to 6.12.* (incl.)
  • unaffected from 6.18.17 to 6.18.* (incl.)
  • unaffected from 6.19.7 to 6.19.* (incl.)
  • unaffected from 7.0-rc3 to * (incl.)

References