blob: 7decd4b3bc7bbc0ba8caeac84f04ccee4a3b5e9a [file] [log] [blame]
{
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
},
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: m_can: m_can_class_allocate_dev(): initialize spin lock on device probe\n\nThe spin lock tx_handling_spinlock in struct m_can_classdev is not\nbeing initialized. This leads the following spinlock bad magic\ncomplaint from the kernel, eg. when trying to send CAN frames with\ncansend from can-utils:\n\n| BUG: spinlock bad magic on CPU#0, cansend/95\n| lock: 0xff60000002ec1010, .magic: 00000000, .owner: <none>/-1, .owner_cpu: 0\n| CPU: 0 UID: 0 PID: 95 Comm: cansend Not tainted 6.15.0-rc3-00032-ga79be02bba5c #5 NONE\n| Hardware name: MachineWare SIM-V (DT)\n| Call Trace:\n| [<ffffffff800133e0>] dump_backtrace+0x1c/0x24\n| [<ffffffff800022f2>] show_stack+0x28/0x34\n| [<ffffffff8000de3e>] dump_stack_lvl+0x4a/0x68\n| [<ffffffff8000de70>] dump_stack+0x14/0x1c\n| [<ffffffff80003134>] spin_dump+0x62/0x6e\n| [<ffffffff800883ba>] do_raw_spin_lock+0xd0/0x142\n| [<ffffffff807a6fcc>] _raw_spin_lock_irqsave+0x20/0x2c\n| [<ffffffff80536dba>] m_can_start_xmit+0x90/0x34a\n| [<ffffffff806148b0>] dev_hard_start_xmit+0xa6/0xee\n| [<ffffffff8065b730>] sch_direct_xmit+0x114/0x292\n| [<ffffffff80614e2a>] __dev_queue_xmit+0x3b0/0xaa8\n| [<ffffffff8073b8fa>] can_send+0xc6/0x242\n| [<ffffffff8073d1c0>] raw_sendmsg+0x1a8/0x36c\n| [<ffffffff805ebf06>] sock_write_iter+0x9a/0xee\n| [<ffffffff801d06ea>] vfs_write+0x184/0x3a6\n| [<ffffffff801d0a88>] ksys_write+0xa0/0xc0\n| [<ffffffff801d0abc>] __riscv_sys_write+0x14/0x1c\n| [<ffffffff8079ebf8>] do_trap_ecall_u+0x168/0x212\n| [<ffffffff807a830a>] handle_exception+0x146/0x152\n\nInitializing the spin lock in m_can_class_allocate_dev solves that\nproblem."
}
],
"affected": [
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/net/can/m_can/m_can.c"
],
"versions": [
{
"version": "1fa80e23c15051edc1c594270517de3517ded798",
"lessThan": "2ecce25ea296f328d79070ee36229a15aeeb7aca",
"status": "affected",
"versionType": "git"
},
{
"version": "1fa80e23c15051edc1c594270517de3517ded798",
"lessThan": "7d5379cfecfdd665e4206bc4f19824656388779f",
"status": "affected",
"versionType": "git"
},
{
"version": "1fa80e23c15051edc1c594270517de3517ded798",
"lessThan": "dcaeeb8ae84c5506ebc574732838264f3887738c",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/net/can/m_can/m_can.c"
],
"versions": [
{
"version": "6.9",
"status": "affected"
},
{
"version": "0",
"lessThan": "6.9",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.12.29",
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.14.7",
"lessThanOrEqual": "6.14.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.15",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.12.29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.14.7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.15"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2ecce25ea296f328d79070ee36229a15aeeb7aca"
},
{
"url": "https://git.kernel.org/stable/c/7d5379cfecfdd665e4206bc4f19824656388779f"
},
{
"url": "https://git.kernel.org/stable/c/dcaeeb8ae84c5506ebc574732838264f3887738c"
}
],
"title": "can: m_can: m_can_class_allocate_dev(): initialize spin lock on device probe",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
"cveID": "CVE-2025-37993",
"requesterUserId": "gregkh@kernel.org",
"serial": "1",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}