CVE-2025-38004

Updated: 2026-02-08 04:11:11.396688

Description:

In the Linux kernel, the following vulnerability has been resolved: can: bcm: add locking for bcm_op runtime updates The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero. Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh. At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.1 HIGH In Testing 2026-01-28 20:52:26
CentOS 6 ELS kernel 2.6.32 7.1 HIGH Released CLSA-2026:1768669128 2026-01-28 12:24:37
CentOS 7 ELS kernel 3.10.0 7.1 HIGH Released CLSA-2026:1768110920 2026-01-20 17:51:05
CentOS 8.4 ELS kernel 4.18.0 7.1 HIGH Needs Triage 2025-12-28 07:58:55
CentOS 8.5 ELS kernel 4.18.0 7.1 HIGH In Progress 2026-02-10 14:02:51
CentOS Stream 8 ELS kernel 4.18.0 7.1 HIGH Needs Triage 2025-12-28 07:59:01
CloudLinux 7 ELS kernel 3.10.0 7.1 HIGH Needs Triage 2025-12-28 07:59:03
Oracle Linux 6 ELS kernel 2.6.32 7.1 HIGH Released CLSA-2026:1769610819 2026-01-28 20:52:24
Oracle Linux 7 ELS kernel 3.10.0 7.1 HIGH Released CLSA-2026:1767867153 2026-01-08 16:31:55
Oracle Linux 7 ELS kernel-uek 5.4.17 7.1 HIGH Released CLSA-2025:1757963029 2025-09-16 11:20:13
Total: 16