CVE-2025-23151

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
01/05/2025
Last modified:
05/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bus: mhi: host: Fix race between unprepare and queue_buf<br /> <br /> A client driver may use mhi_unprepare_from_transfer() to quiesce<br /> incoming data during the client driver&amp;#39;s tear down. The client driver<br /> might also be processing data at the same time, resulting in a call to<br /> mhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs<br /> after mhi_unprepare_from_transfer() has torn down the channel, a panic<br /> will occur due to an invalid dereference leading to a page fault.<br /> <br /> This occurs because mhi_gen_tre() does not verify the channel state<br /> after locking it. Fix this by having mhi_gen_tre() confirm the channel<br /> state is valid, or return error to avoid accessing deinitialized data.<br /> <br /> [mani: added stable tag]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.149 (including) 5.15.181 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.76 (including) 6.1.135 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.15 (including) 6.6.88 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7.3 (including) 6.12.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.14 (including) 6.14.3 (excluding)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*