We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: can: bcm: add missing rcu read protection for procfs content When the procfs content is generated for a bcm_op which is in the process to be removed the procfs output might show unreliable data (UAF). As the removal of bcm_op's is already implemented with rcu handling this patch adds the missing rcu_read_lock() and makes sure the list entries are properly removed under rcu protection.
Reserved 2025-04-16 | Published 2025-06-08 | Updated 2025-06-08 | Assigner Linuxgit.kernel.org/...c/19f553a1ddf260da6570ed8f8d91a8c87f49b63a
git.kernel.org/...c/659701c0b954ccdb4a916a4ad59bbc16e726d42c
git.kernel.org/...c/0622846db728a5332b917c797c733e202c4620ae
git.kernel.org/...c/6d7d458c41b98a5c1670cbd36f2923c37de51cf5
git.kernel.org/...c/1f912f8484e9c4396378c39460bbea0af681f319
git.kernel.org/...c/63567ecd99a24495208dc860d50fb17440043006
git.kernel.org/...c/7c9db92d5f0eadca30884af75c53d601edc512ee
git.kernel.org/...c/dac5e6249159ac255dad9781793dbe5908ac9ddb
Support options