CVE-2025-23146
mfd: ene-kb3930: Fix a potential NULL pointer dereference
Description
In the Linux kernel, the following vulnerability has been resolved: mfd: ene-kb3930: Fix a potential NULL pointer dereference The off_gpios could be NULL. Add missing check in the kb3930_probe(). This is similar to the issue fixed in commit b1ba8bcb2d1f ("backlight: hx8357: Fix potential NULL pointer dereference"). This was detected by our static analysis tool.
INFO
Published Date :
May 1, 2025, 1:15 p.m.
Last Modified :
Nov. 5, 2025, 6:05 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the Linux kernel to include the fix.
- Recompile and deploy the kernel.
- Verify the fix by testing the driver.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-23146.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-23146 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-23146
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-23146 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-23146 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Nov. 05, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-476 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.13.12 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.14 up to (excluding) 6.14.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.88 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.24 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.181 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.135 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.10 up to (excluding) 5.10.237 Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* Added Reference Type kernel.org: https://git.kernel.org/stable/c/2edb5b29b197d90b4d08cd45e911c0bcf24cb895 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/4cdf1d2a816a93fa02f7b6b5492dc7f55af2a199 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/6dc88993ee3fa8365ff6a5d6514702f70ba6863a Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/76d0f4199bc5b51acb7b96c6663a8953543733ad Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/7b47df6498f223c8956bfe0d994a0e42a520dfcd Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/90ee23c2514a22a9c2bb39a540cbe1c9acb27d0b Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/b1758417310d2cc77e52cd15103497e52e2614f6 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/ea07760676bba49319d553af80c239da053b5fb1 Types: Patch Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html Types: Mailing List Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html Types: Mailing List -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 03, 2025
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html Added Reference https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 02, 2025
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/6dc88993ee3fa8365ff6a5d6514702f70ba6863a Added Reference https://git.kernel.org/stable/c/90ee23c2514a22a9c2bb39a540cbe1c9acb27d0b -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 01, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: mfd: ene-kb3930: Fix a potential NULL pointer dereference The off_gpios could be NULL. Add missing check in the kb3930_probe(). This is similar to the issue fixed in commit b1ba8bcb2d1f ("backlight: hx8357: Fix potential NULL pointer dereference"). This was detected by our static analysis tool. Added Reference https://git.kernel.org/stable/c/2edb5b29b197d90b4d08cd45e911c0bcf24cb895 Added Reference https://git.kernel.org/stable/c/4cdf1d2a816a93fa02f7b6b5492dc7f55af2a199 Added Reference https://git.kernel.org/stable/c/76d0f4199bc5b51acb7b96c6663a8953543733ad Added Reference https://git.kernel.org/stable/c/7b47df6498f223c8956bfe0d994a0e42a520dfcd Added Reference https://git.kernel.org/stable/c/b1758417310d2cc77e52cd15103497e52e2614f6 Added Reference https://git.kernel.org/stable/c/ea07760676bba49319d553af80c239da053b5fb1