In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Fix race between unprepare and queue_buf
A client driver may use mhi_unprepare_from_transfer() to quiesce
incoming data during the client driver's tear down. The client driver
might also be processing data at the same time, resulting in a call to
mhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs
after mhi_unprepare_from_transfer() has torn down the channel, a panic
will occur due to an invalid dereference leading to a page fault.
This occurs because mhi_gen_tre() does not verify the channel state
after locking it. Fix this by having mhi_gen_tre() confirm the channel
state is valid, or return error to avoid accessing deinitialized data.
[mani: added stable tag]
CVSS
No CVSS.
References
Configurations
No configuration.
History
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
02 May 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 13:15
Updated : 2025-11-03 20:17
NVD link : CVE-2025-23151
Mitre link : CVE-2025-23151
CVE.ORG link : CVE-2025-23151
JSON object : View
Products Affected
No product.
CWE
No CWE.
