Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-23151


In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Fix race between unprepare and queue_buf A client driver may use mhi_unprepare_from_transfer() to quiesce incoming data during the client driver's tear down. The client driver might also be processing data at the same time, resulting in a call to mhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs after mhi_unprepare_from_transfer() has torn down the channel, a panic will occur due to an invalid dereference leading to a page fault. This occurs because mhi_gen_tre() does not verify the channel state after locking it. Fix this by having mhi_gen_tre() confirm the channel state is valid, or return error to avoid accessing deinitialized data. [mani: added stable tag]


Published

2025-05-01T13:15:51.003

Last Modified

2025-11-05T17:58:11.293

Status

Analyzed

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 4.7 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-362

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 5.15.181 Yes
Operating System linux linux_kernel < 6.1.135 Yes
Operating System linux linux_kernel < 6.6.88 Yes
Operating System linux linux_kernel < 6.12.24 Yes
Operating System linux linux_kernel < 6.13.12 Yes
Operating System linux linux_kernel < 6.14.3 Yes
Operating System debian debian_linux 11.0 Yes

References