CVE-2025-23147

In the Linux kernel, the following vulnerability has been resolved: i3c: Add NULL pointer check in i3c_master_queue_ibi() The I3C master driver may receive an IBI from a target device that has not been probed yet. In such cases, the master calls `i3c_master_queue_ibi()` to queue an IBI work task, leading to "Unable to handle kernel read from unreadable memory" and resulting in a kernel panic. Typical IBI handling flow: 1. The I3C master scans target devices and probes their respective drivers. 2. The target device driver calls `i3c_device_request_ibi()` to enable IBI and assigns `dev->ibi = ibi`. 3. The I3C master receives an IBI from the target device and calls `i3c_master_queue_ibi()` to queue the target device driver’s IBI handler task. However, since target device events are asynchronous to the I3C probe sequence, step 3 may occur before step 2, causing `dev->ibi` to be `NULL`, leading to a kernel panic. Add a NULL pointer check in `i3c_master_queue_ibi()` to prevent accessing an uninitialized `dev->ibi`, ensuring stability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 18:04

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
References () https://git.kernel.org/stable/c/09359e7c8751961937cb5fc50220969b0a4e1058 - () https://git.kernel.org/stable/c/09359e7c8751961937cb5fc50220969b0a4e1058 - Patch
References () https://git.kernel.org/stable/c/1b54faa5f47fa7c642179744aeff03f0810dc62e - () https://git.kernel.org/stable/c/1b54faa5f47fa7c642179744aeff03f0810dc62e - Patch
References () https://git.kernel.org/stable/c/3ba402610843d7d15c7f3966a461deeeaff7fba4 - () https://git.kernel.org/stable/c/3ba402610843d7d15c7f3966a461deeeaff7fba4 - Patch
References () https://git.kernel.org/stable/c/6871a676aa534e8f218279672e0445c725f81026 - () https://git.kernel.org/stable/c/6871a676aa534e8f218279672e0445c725f81026 - Patch
References () https://git.kernel.org/stable/c/bd496a44f041da9ef3afe14d1d6193d460424e91 - () https://git.kernel.org/stable/c/bd496a44f041da9ef3afe14d1d6193d460424e91 - Patch
References () https://git.kernel.org/stable/c/d83b0c03ef8fbea2f03029a1cc1f5041f0e1d47f - () https://git.kernel.org/stable/c/d83b0c03ef8fbea2f03029a1cc1f5041f0e1d47f - Patch
References () https://git.kernel.org/stable/c/e6bba328578feb58c614c11868c259b40484c5fa - () https://git.kernel.org/stable/c/e6bba328578feb58c614c11868c259b40484c5fa - Patch
References () https://git.kernel.org/stable/c/fe4a4fc179b7898055555a11685915473588392e - () https://git.kernel.org/stable/c/fe4a4fc179b7898055555a11685915473588392e - Patch
References () https://git.kernel.org/stable/c/ff9d61db59bb27d16d3f872bff2620d50856b80c - () https://git.kernel.org/stable/c/ff9d61db59bb27d16d3f872bff2620d50856b80c - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

03 Nov 2025, 20:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: i3c: Añadir comprobación de puntero nulo en i3c_master_queue_ibi(). El controlador maestro I3C puede recibir una IBI de un dispositivo de destino que aún no se ha sondeado. En tales casos, el maestro llama a `i3c_master_queue_ibi()` para poner en cola una tarea de trabajo IBI, lo que genera el error "No se puede manejar la lectura del kernel desde memoria ilegible" y provoca un pánico del kernel. Flujo típico de manejo de IBI: 1. El maestro I3C escanea los dispositivos de destino y sondea sus respectivos controladores. 2. El controlador del dispositivo de destino llama a `i3c_device_request_ibi()` para habilitar IBI y asigna `dev->ibi = ibi`. 3. El maestro I3C recibe una IBI del dispositivo de destino y llama a `i3c_master_queue_ibi()` para poner en cola la tarea de manejo de IBI del controlador del dispositivo de destino. Sin embargo, dado que los eventos del dispositivo de destino son asíncronos a la secuencia de sondeo I3C, el paso 3 puede ocurrir antes del paso 2, lo que provoca que `dev->ibi` sea `NULL` y provoque un pánico del kernel. Agregue una comprobación de puntero NULL en `i3c_master_queue_ibi()` para evitar el acceso a un `dev->ibi` sin inicializar, garantizando así la estabilidad.

02 May 2025, 07:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/09359e7c8751961937cb5fc50220969b0a4e1058 -
  • () https://git.kernel.org/stable/c/1b54faa5f47fa7c642179744aeff03f0810dc62e -
  • () https://git.kernel.org/stable/c/3ba402610843d7d15c7f3966a461deeeaff7fba4 -

01 May 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 13:15

Updated : 2025-11-05 18:04


NVD link : CVE-2025-23147

Mitre link : CVE-2025-23147

CVE.ORG link : CVE-2025-23147


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference