{"id":"CVE-2026-23362","summary":"can: bcm: fix locking for bcm_op runtime updates","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: fix locking for bcm_op runtime updates\n\nCommit c2aba69d0c36 (\"can: bcm: add locking for bcm_op runtime updates\")\nadded a locking for some variables that can be modified at runtime when\nupdating the sending bcm_op with a new TX_SETUP command in bcm_tx_setup().\n\nUsually the RX_SETUP only handles and filters incoming traffic with one\nexception: When the RX_RTR_FRAME flag is set a predefined CAN frame is\nsent when a specific RTR frame is received. Therefore the rx bcm_op uses\nbcm_can_tx() which uses the bcm_tx_lock that was only initialized in\nbcm_tx_setup(). Add the missing spin_lock_init() when allocating the\nbcm_op in bcm_rx_setup() to handle the RTR case properly.","modified":"2026-04-02T13:12:22.861062Z","published":"2026-03-25T10:27:45.476Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23362.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70e951afad4c025261fe3c952d2b07237e320a01"},{"type":"WEB","url":"https://git.kernel.org/stable/c/800f26f11ae37b17f58e0001f28a47dd75c26557"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8215ba7bc99e84e66fd6938874ec4330a9d96518"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8bcf2d847adb82b2c617456f6da17ac5e6c75285"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c35636e91e392e1540949bbc67932167cb48bc3a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0c349b2c21b220af5ba19f29b885e222958d796"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23362.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23362"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2a437b86ac5a9893c902f30ef66815bf13587bf6"},{"fixed":"800f26f11ae37b17f58e0001f28a47dd75c26557"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"76c84c3728178b2d38d5604e399dfe8b0752645e"},{"fixed":"70e951afad4c025261fe3c952d2b07237e320a01"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"cc55dd28c20a6611e30596019b3b2f636819a4c0"},{"fixed":"8bcf2d847adb82b2c617456f6da17ac5e6c75285"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7"},{"fixed":"8215ba7bc99e84e66fd6938874ec4330a9d96518"},{"fixed":"f0c349b2c21b220af5ba19f29b885e222958d796"},{"fixed":"c35636e91e392e1540949bbc67932167cb48bc3a"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"8f1c022541bf5a923c8d6fa483112c15250f30a4"},{"last_affected":"7595de7bc56e0e52b74e56c90f7e247bf626d628"},{"last_affected":"fbd8fdc2b218e979cfe422b139b8f74c12419d1f"},{"last_affected":"c4e8a172501e677ebd8ea9d9161d97dc4df56fbd"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23362.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.1.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.77"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.15.0"},{"fixed":"6.19.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23362.json"}}],"schema_version":"1.7.5"}