In the Linux kernel, the following vulnerability has been resolved: can: bcm: fix locking for bcmop runtime updates Commit c2aba69d0c36 ("can: bcm: add locking for bcmop runtime updates") added a locking for some variables that can be modified at runtime when updating the sending bcmop with a new TXSETUP command in bcmtxsetup(). Usually the RXSETUP only handles and filters incoming traffic with one exception: When the RXRTRFRAME flag is set a predefined CAN frame is sent when a specific RTR frame is received. Therefore the rx bcmop uses bcmcantx() which uses the bcmtxlock that was only initialized in bcmtxsetup(). Add the missing spinlockinit() when allocating the bcmop in bcmrx_setup() to handle the RTR case properly.