Linux Kernel: Fix bcm OP Runtime Update Locking
CVE-2026-23362 Published on March 25, 2026
can: bcm: fix locking for bcm_op runtime updates
In the Linux kernel, the following vulnerability has been resolved:
can: bcm: fix locking for bcm_op runtime updates
Commit c2aba69d0c36 ("can: bcm: add locking for bcm_op runtime updates")
added a locking for some variables that can be modified at runtime when
updating the sending bcm_op with a new TX_SETUP command in bcm_tx_setup().
Usually the RX_SETUP only handles and filters incoming traffic with one
exception: When the RX_RTR_FRAME flag is set a predefined CAN frame is
sent when a specific RTR frame is received. Therefore the rx bcm_op uses
bcm_can_tx() which uses the bcm_tx_lock that was only initialized in
bcm_tx_setup(). Add the missing spin_lock_init() when allocating the
bcm_op in bcm_rx_setup() to handle the RTR case properly.
Products Associated with CVE-2026-23362
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 2a437b86ac5a9893c902f30ef66815bf13587bf6 and below 800f26f11ae37b17f58e0001f28a47dd75c26557 is affected.
- Version 76c84c3728178b2d38d5604e399dfe8b0752645e and below 70e951afad4c025261fe3c952d2b07237e320a01 is affected.
- Version cc55dd28c20a6611e30596019b3b2f636819a4c0 and below 8bcf2d847adb82b2c617456f6da17ac5e6c75285 is affected.
- Version c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7 and below 8215ba7bc99e84e66fd6938874ec4330a9d96518 is affected.
- Version c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7 and below f0c349b2c21b220af5ba19f29b885e222958d796 is affected.
- Version c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7 and below c35636e91e392e1540949bbc67932167cb48bc3a is affected.
- Version 8f1c022541bf5a923c8d6fa483112c15250f30a4 is affected.
- Version 7595de7bc56e0e52b74e56c90f7e247bf626d628 is affected.
- Version fbd8fdc2b218e979cfe422b139b8f74c12419d1f is affected.
- Version c4e8a172501e677ebd8ea9d9161d97dc4df56fbd is affected.
- Version 6.15 is affected.
- Before 6.15 is unaffected.
- Version 6.1.167, <= 6.1.* is unaffected.
- Version 6.6.130, <= 6.6.* is unaffected.
- Version 6.12.77, <= 6.12.* is unaffected.
- Version 6.18.17, <= 6.18.* is unaffected.
- Version 6.19.7, <= 6.19.* is unaffected.
- Version 7.0-rc3, <= * is unaffected.