CVE-2025-23147

Source
https://cve.org/CVERecord?id=CVE-2025-23147
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-23147.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-23147
Downstream
Related
Published
2025-05-01T12:55:36.099Z
Modified
2026-05-07T04:16:50.487050Z
Summary
i3c: Add NULL pointer check in i3c_master_queue_ibi()
Details

In the Linux kernel, the following vulnerability has been resolved:

i3c: Add NULL pointer check in i3cmasterqueue_ibi()

The I3C master driver may receive an IBI from a target device that has not been probed yet. In such cases, the master calls i3c_master_queue_ibi() to queue an IBI work task, leading to "Unable to handle kernel read from unreadable memory" and resulting in a kernel panic.

Typical IBI handling flow: 1. The I3C master scans target devices and probes their respective drivers. 2. The target device driver calls i3c_device_request_ibi() to enable IBI and assigns dev->ibi = ibi. 3. The I3C master receives an IBI from the target device and calls i3c_master_queue_ibi() to queue the target device driver’s IBI handler task.

However, since target device events are asynchronous to the I3C probe sequence, step 3 may occur before step 2, causing dev->ibi to be NULL, leading to a kernel panic.

Add a NULL pointer check in i3c_master_queue_ibi() to prevent accessing an uninitialized dev->ibi, ensuring stability.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/23xxx/CVE-2025-23147.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a379bbcea0af6280e1ca0d1edfcf4e68cde6ee0
Fixed
1b54faa5f47fa7c642179744aeff03f0810dc62e
Fixed
09359e7c8751961937cb5fc50220969b0a4e1058
Fixed
3ba402610843d7d15c7f3966a461deeeaff7fba4
Fixed
d83b0c03ef8fbea2f03029a1cc1f5041f0e1d47f
Fixed
6871a676aa534e8f218279672e0445c725f81026
Fixed
e6bba328578feb58c614c11868c259b40484c5fa
Fixed
fe4a4fc179b7898055555a11685915473588392e
Fixed
ff9d61db59bb27d16d3f872bff2620d50856b80c
Fixed
bd496a44f041da9ef3afe14d1d6193d460424e91

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-23147.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.4.293
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.237
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.181
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.135
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.88
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.24
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.12
Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.14.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-23147.json"