CVE-2025-38004

Updated: 2026-02-08 04:11:11.396688

Description:

In the Linux kernel, the following vulnerability has been resolved: can: bcm: add locking for bcm_op runtime updates The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero. Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh. At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

RHEL 7 ELS kernel 3.10.0 7.1 HIGH Released CLSA-2026:1767867718 2026-01-08 16:31:53
TuxCare 9.6 ESU kernel 5.14.0 7.1 HIGH In Testing 2026-01-13 11:31:23
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.1 HIGH Needs Triage 2025-12-28 07:06:13
Ubuntu 16.04 ELS linux 4.4.0 7.1 HIGH Needs Triage 2025-12-28 07:16:18
Ubuntu 18.04 ELS linux 4.15.0 7.1 HIGH Needs Triage 2025-12-28 07:16:15
Ubuntu 20.04 ELS linux 5.4.0 7.1 HIGH Needs Triage 2025-12-28 07:16:16
Total: 16