Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-38004


In the Linux kernel, the following vulnerability has been resolved: can: bcm: add locking for bcm_op runtime updates The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero. Although this appeared to be a safe operation the updates of 'currframe' can be triggered from user space and hrtimer context in bcm_can_tx(). Anderson Nascimento created a proof of concept that triggered a KASAN slab-out-of-bounds read access which can be prevented with a spin_lock_bh. At the rework of bcm_can_tx() the 'count' variable has been moved into the protected section as this variable can be modified from both contexts too.


Published

2025-06-08T11:15:22.210

Last Modified

2025-12-17T20:03:40.453

Status

Analyzed

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 7.1 (HIGH)

Weaknesses
  • Type: Primary
    CWE-125

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 5.4.294 Yes
Operating System linux linux_kernel < 5.10.238 Yes
Operating System linux linux_kernel < 5.15.185 Yes
Operating System linux linux_kernel < 6.1.141 Yes
Operating System linux linux_kernel < 6.6.93 Yes
Operating System linux linux_kernel < 6.12.31 Yes
Operating System linux linux_kernel < 6.14.9 Yes
Operating System linux linux_kernel 6.15 Yes
Operating System linux linux_kernel 6.15 Yes
Operating System linux linux_kernel 6.15 Yes
Operating System linux linux_kernel 6.15 Yes
Operating System linux linux_kernel 6.15 Yes
Operating System linux linux_kernel 6.15 Yes
Operating System linux linux_kernel 6.15 Yes
Operating System debian debian_linux 11.0 Yes

References