CVE-2026-23362
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
24/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: bcm: fix locking for bcm_op runtime updates<br />
<br />
Commit c2aba69d0c36 ("can: bcm: add locking for bcm_op runtime updates")<br />
added a locking for some variables that can be modified at runtime when<br />
updating the sending bcm_op with a new TX_SETUP command in bcm_tx_setup().<br />
<br />
Usually the RX_SETUP only handles and filters incoming traffic with one<br />
exception: When the RX_RTR_FRAME flag is set a predefined CAN frame is<br />
sent when a specific RTR frame is received. Therefore the rx bcm_op uses<br />
bcm_can_tx() which uses the bcm_tx_lock that was only initialized in<br />
bcm_tx_setup(). Add the missing spin_lock_init() when allocating the<br />
bcm_op in bcm_rx_setup() to handle the RTR case properly.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.294 (including) | 5.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.238 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.185 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.141 (including) | 6.1.167 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.93 (including) | 6.6.130 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.31 (including) | 6.12.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14.9 (including) | 6.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.15.1 (including) | 6.18.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0904037e713f787d1376e1d349c3bdf6c3105881
- https://git.kernel.org/stable/c/70e951afad4c025261fe3c952d2b07237e320a01
- https://git.kernel.org/stable/c/800f26f11ae37b17f58e0001f28a47dd75c26557
- https://git.kernel.org/stable/c/8215ba7bc99e84e66fd6938874ec4330a9d96518
- https://git.kernel.org/stable/c/8bcf2d847adb82b2c617456f6da17ac5e6c75285
- https://git.kernel.org/stable/c/c35636e91e392e1540949bbc67932167cb48bc3a
- https://git.kernel.org/stable/c/c85b96eaf766d8f066b1139a17a51efa2f6627ef
- https://git.kernel.org/stable/c/f0c349b2c21b220af5ba19f29b885e222958d796



