In the Linux kernel, the following vulnerability has been resolved:
can: bcm: fix locking for bcm_op runtime updates
Commit c2aba69d0c36 ("can: bcm: add locking for bcmop runtime updates") added a locking for some variables that can be modified at runtime when updating the sending bcmop with a new TXSETUP command in bcmtx_setup().
Usually the RXSETUP only handles and filters incoming traffic with one exception: When the RXRTRFRAME flag is set a predefined CAN frame is sent when a specific RTR frame is received. Therefore the rx bcmop uses bcmcantx() which uses the bcmtxlock that was only initialized in bcmtxsetup(). Add the missing spinlockinit() when allocating the bcmop in bcmrx_setup() to handle the RTR case properly.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23362.json",
"cna_assigner": "Linux"
}