In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Fix race between unprepare and queue_buf
A client driver may use mhi_unprepare_from_transfer() to quiesce
incoming data during the client driver's tear down. The client driver
might also be processing data at the same time, resulting in a call to
mhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs
after mhi_unprepare_from_transfer() has torn down the channel, a panic
will occur due to an invalid dereference leading to a page fault.
This occurs because mhi_gen_tre() does not verify the channel state
after locking it. Fix this by having mhi_gen_tre() confirm the channel
state is valid, or return error to avoid accessing deinitialized data.
[mani: added stable tag]
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
05 Nov 2025, 17:58
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-362 | |
| References | () https://git.kernel.org/stable/c/0686a818d77a431fc3ba2fab4b46bbb04e8c9380 - Patch | |
| References | () https://git.kernel.org/stable/c/178e5657c8fd285125cc6743a81b513bce099760 - Patch | |
| References | () https://git.kernel.org/stable/c/3e7ecf181cbdde9753204ada3883ca1704d8702b - Patch | |
| References | () https://git.kernel.org/stable/c/5f084993c90d9d0b4a52a349ede5120f992a7ca1 - Patch | |
| References | () https://git.kernel.org/stable/c/899d0353ea69681f474b6bc9de32c663b89672da - Patch | |
| References | () https://git.kernel.org/stable/c/a77955f7704b2a00385e232cbcc1cb06b5c7a425 - Patch | |
| References | () https://git.kernel.org/stable/c/ee1fce83ed56450087309b9b74ad9bcb2b010fa6 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List | |
| First Time |
Debian debian Linux
Linux Debian Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
02 May 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
01 May 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 13:15
Updated : 2025-11-05 17:58
NVD link : CVE-2025-23151
Mitre link : CVE-2025-23151
CVE.ORG link : CVE-2025-23151
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
