๐Ÿ” CVE Alert

CVE-2025-38003

UNKNOWN 0.0

can: bcm: add missing rcu read protection for procfs content

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: can: bcm: add missing rcu read protection for procfs content When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF). As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5b48f5711f1c630841ab78dcc061de902f0e37bf < 19f553a1ddf260da6570ed8f8d91a8c87f49b63a 85cd41070df992d3c0dfd828866fdd243d3b774a < 659701c0b954ccdb4a916a4ad59bbc16e726d42c f34f2a18e47b73e48f90a757e1f4aaa8c7d665a1 < 0622846db728a5332b917c797c733e202c4620ae f1b4e32aca0811aa011c76e5d6cf2fa19224b386 < 6d7d458c41b98a5c1670cbd36f2923c37de51cf5 f1b4e32aca0811aa011c76e5d6cf2fa19224b386 < 1f912f8484e9c4396378c39460bbea0af681f319 f1b4e32aca0811aa011c76e5d6cf2fa19224b386 < 63567ecd99a24495208dc860d50fb17440043006 f1b4e32aca0811aa011c76e5d6cf2fa19224b386 < 7c9db92d5f0eadca30884af75c53d601edc512ee f1b4e32aca0811aa011c76e5d6cf2fa19224b386 < dac5e6249159ac255dad9781793dbe5908ac9ddb fbac09a3b8890003c0c55294c00709f3ae5501bb edb4baffb9483141a50fb7f7146cfe4a4c0c2db8
Linux / Linux
5.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/19f553a1ddf260da6570ed8f8d91a8c87f49b63a git.kernel.org: https://git.kernel.org/stable/c/659701c0b954ccdb4a916a4ad59bbc16e726d42c git.kernel.org: https://git.kernel.org/stable/c/0622846db728a5332b917c797c733e202c4620ae git.kernel.org: https://git.kernel.org/stable/c/6d7d458c41b98a5c1670cbd36f2923c37de51cf5 git.kernel.org: https://git.kernel.org/stable/c/1f912f8484e9c4396378c39460bbea0af681f319 git.kernel.org: https://git.kernel.org/stable/c/63567ecd99a24495208dc860d50fb17440043006 git.kernel.org: https://git.kernel.org/stable/c/7c9db92d5f0eadca30884af75c53d601edc512ee git.kernel.org: https://git.kernel.org/stable/c/dac5e6249159ac255dad9781793dbe5908ac9ddb lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html