CVE-2025-37993
In the Linux kernel, the following vulnerability has been resolved:
can: m_can: m_can_class_allocate_dev(): initialize spin lock on device probe
The spin lock tx_handling_spinlock in struct m_can_classdev is not
being initialized. This leads the following spinlock bad magic
complaint from the kernel, eg. when trying to send CAN frames with
cansend from can-utils:
| BUG: spinlock bad magic on CPU#0, cansend/95
| lock: 0xff60000002ec1010, .magic: 00000000, .owner:
| CPU: 0 UID: 0 PID: 95 Comm: cansend Not tainted 6.15.0-rc3-00032-ga79be02bba5c #5 NONE
| Hardware name: MachineWare SIM-V (DT)
| Call Trace:
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
| [
Initializing the spin lock in m_can_class_allocate_dev solves that
problem.
More information : https://git.kernel.org/stable/c/2ecce25ea296f328d79070ee36229a15aeeb7aca
