CVE-2025-23151

In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Fix race between unprepare and queue_buf A client driver may use mhi_unprepare_from_transfer() to quiesce incoming data during the client driver's tear down. The client driver might also be processing data at the same time, resulting in a call to mhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs after mhi_unprepare_from_transfer() has torn down the channel, a panic will occur due to an invalid dereference leading to a page fault. This occurs because mhi_gen_tre() does not verify the channel state after locking it. Fix this by having mhi_gen_tre() confirm the channel state is valid, or return error to avoid accessing deinitialized data. [mani: added stable tag]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 17:58

Type Values Removed Values Added
CWE CWE-362
References () https://git.kernel.org/stable/c/0686a818d77a431fc3ba2fab4b46bbb04e8c9380 - () https://git.kernel.org/stable/c/0686a818d77a431fc3ba2fab4b46bbb04e8c9380 - Patch
References () https://git.kernel.org/stable/c/178e5657c8fd285125cc6743a81b513bce099760 - () https://git.kernel.org/stable/c/178e5657c8fd285125cc6743a81b513bce099760 - Patch
References () https://git.kernel.org/stable/c/3e7ecf181cbdde9753204ada3883ca1704d8702b - () https://git.kernel.org/stable/c/3e7ecf181cbdde9753204ada3883ca1704d8702b - Patch
References () https://git.kernel.org/stable/c/5f084993c90d9d0b4a52a349ede5120f992a7ca1 - () https://git.kernel.org/stable/c/5f084993c90d9d0b4a52a349ede5120f992a7ca1 - Patch
References () https://git.kernel.org/stable/c/899d0353ea69681f474b6bc9de32c663b89672da - () https://git.kernel.org/stable/c/899d0353ea69681f474b6bc9de32c663b89672da - Patch
References () https://git.kernel.org/stable/c/a77955f7704b2a00385e232cbcc1cb06b5c7a425 - () https://git.kernel.org/stable/c/a77955f7704b2a00385e232cbcc1cb06b5c7a425 - Patch
References () https://git.kernel.org/stable/c/ee1fce83ed56450087309b9b74ad9bcb2b010fa6 - () https://git.kernel.org/stable/c/ee1fce83ed56450087309b9b74ad9bcb2b010fa6 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

03 Nov 2025, 20:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bus: mhi: host: Corrección de la competencia entre unprepare y queue_buf. Un controlador de cliente podría usar mhi_unprepare_from_transfer() para silenciar los datos entrantes durante su desconexión. El controlador de cliente también podría estar procesando datos simultáneamente, lo que resulta en una llamada a mhi_queue_buf(), que invocará mhi_gen_tre(). Si mhi_gen_tre() se ejecuta después de que mhi_unprepare_from_transfer() haya desconectado el canal, se producirá un pánico debido a una desreferencia no válida que provoca un fallo de página. Esto ocurre porque mhi_gen_tre() no verifica el estado del canal después de bloquearlo. Para solucionar esto, haga que mhi_gen_tre() confirme que el estado del canal es válido o devuelva un error para evitar acceder a los datos desinicializados. [mani: etiqueta estable añadida]

02 May 2025, 07:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/899d0353ea69681f474b6bc9de32c663b89672da -

01 May 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 13:15

Updated : 2025-11-05 17:58


NVD link : CVE-2025-23151

Mitre link : CVE-2025-23151

CVE.ORG link : CVE-2025-23151


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')