CVE-2026-23362
Race Condition in Linux Kernel CAN BCM Runtime Updates
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | From 6.14.9 (inc) to 6.15 (exc) |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 5.10.238 (inc) to 5.10.253 (exc) |
| linux | linux_kernel | From 5.15.185 (inc) to 5.15.203 (exc) |
| linux | linux_kernel | From 5.4.294 (inc) to 5.5 (exc) |
| linux | linux_kernel | From 6.1.141 (inc) to 6.1.167 (exc) |
| linux | linux_kernel | From 6.12.31 (inc) to 6.12.77 (exc) |
| linux | linux_kernel | From 6.15.1 (inc) to 6.18.17 (exc) |
| linux | linux_kernel | From 6.6.93 (inc) to 6.6.130 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the Controller Area Network (CAN) subsystem, specifically the bcm (broadcast manager) component. The issue was that certain variables used during runtime updates of bcm operations (bcm_op) were not properly protected by locking mechanisms. This could lead to race conditions when updating bcm_op with new TX_SETUP commands. The fix involved adding proper locking (spin_lock_init) during the allocation of bcm_op in the bcm_rx_setup function to handle cases where a predefined CAN frame is sent in response to a specific RTR frame.
How can this vulnerability impact me? :
The vulnerability could cause improper synchronization when updating CAN bcm operations at runtime, potentially leading to race conditions or inconsistent states within the CAN subsystem. This might result in unexpected behavior in CAN message handling, such as incorrect transmission or reception of CAN frames, which could affect systems relying on CAN communication for critical functions.