<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 05:49:09 +0000</lastBuildDate>
    <item>
      <title>e84decdf-39c2-4ddc-955c-06f7374ca595</title>
      <link>https://vulnerability.circl.lu/sighting/e84decdf-39c2-4ddc-955c-06f7374ca595/export</link>
      <description>{"uuid": "e84decdf-39c2-4ddc-955c-06f7374ca595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23151", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14798", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23151\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Fix race between unprepare and queue_buf\n\nA client driver may use mhi_unprepare_from_transfer() to quiesce\nincoming data during the client driver's tear down. The client driver\nmight also be processing data at the same time, resulting in a call to\nmhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs\nafter mhi_unprepare_from_transfer() has torn down the channel, a panic\nwill occur due to an invalid dereference leading to a page fault.\n\nThis occurs because mhi_gen_tre() does not verify the channel state\nafter locking it. Fix this by having mhi_gen_tre() confirm the channel\nstate is valid, or return error to avoid accessing deinitialized data.\n\n[mani: added stable tag]\n\ud83d\udccf Published: 2025-05-01T12:55:38.833Z\n\ud83d\udccf Modified: 2025-05-04T13:07:12.765Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/899d0353ea69681f474b6bc9de32c663b89672da\n2. https://git.kernel.org/stable/c/3e7ecf181cbdde9753204ada3883ca1704d8702b\n3. https://git.kernel.org/stable/c/5f084993c90d9d0b4a52a349ede5120f992a7ca1\n4. https://git.kernel.org/stable/c/a77955f7704b2a00385e232cbcc1cb06b5c7a425\n5. https://git.kernel.org/stable/c/178e5657c8fd285125cc6743a81b513bce099760\n6. https://git.kernel.org/stable/c/ee1fce83ed56450087309b9b74ad9bcb2b010fa6\n7. https://git.kernel.org/stable/c/0686a818d77a431fc3ba2fab4b46bbb04e8c9380", "creation_timestamp": "2025-05-04T13:18:40.000000Z"}</description>
      <content:encoded>{"uuid": "e84decdf-39c2-4ddc-955c-06f7374ca595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23151", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14798", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23151\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nbus: mhi: host: Fix race between unprepare and queue_buf\n\nA client driver may use mhi_unprepare_from_transfer() to quiesce\nincoming data during the client driver's tear down. The client driver\nmight also be processing data at the same time, resulting in a call to\nmhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs\nafter mhi_unprepare_from_transfer() has torn down the channel, a panic\nwill occur due to an invalid dereference leading to a page fault.\n\nThis occurs because mhi_gen_tre() does not verify the channel state\nafter locking it. Fix this by having mhi_gen_tre() confirm the channel\nstate is valid, or return error to avoid accessing deinitialized data.\n\n[mani: added stable tag]\n\ud83d\udccf Published: 2025-05-01T12:55:38.833Z\n\ud83d\udccf Modified: 2025-05-04T13:07:12.765Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/899d0353ea69681f474b6bc9de32c663b89672da\n2. https://git.kernel.org/stable/c/3e7ecf181cbdde9753204ada3883ca1704d8702b\n3. https://git.kernel.org/stable/c/5f084993c90d9d0b4a52a349ede5120f992a7ca1\n4. https://git.kernel.org/stable/c/a77955f7704b2a00385e232cbcc1cb06b5c7a425\n5. https://git.kernel.org/stable/c/178e5657c8fd285125cc6743a81b513bce099760\n6. https://git.kernel.org/stable/c/ee1fce83ed56450087309b9b74ad9bcb2b010fa6\n7. https://git.kernel.org/stable/c/0686a818d77a431fc3ba2fab4b46bbb04e8c9380", "creation_timestamp": "2025-05-04T13:18:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e84decdf-39c2-4ddc-955c-06f7374ca595/export</guid>
      <pubDate>Sun, 04 May 2025 13:18:40 +0000</pubDate>
    </item>
  </channel>
</rss>
