Skip to main content

CVE-2025-21713: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-21713cvecve-2025-21713
Published: Thu Feb 27 2025 (02/27/2025, 02:07:24 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/iommu: Don't unset window if it was never set On pSeries, when user attempts to use the same vfio container used by different iommu group, the spapr_tce_set_window() returns -EPERM and the subsequent cleanup leads to the below crash. Kernel attempted to read user page (308) - exploit attempt? BUG: Kernel NULL pointer dereference on read at 0x00000308 Faulting instruction address: 0xc0000000001ce358 Oops: Kernel access of bad area, sig: 11 [#1] NIP: c0000000001ce358 LR: c0000000001ce05c CTR: c00000000005add0 <snip> NIP [c0000000001ce358] spapr_tce_unset_window+0x3b8/0x510 LR [c0000000001ce05c] spapr_tce_unset_window+0xbc/0x510 Call Trace: spapr_tce_unset_window+0xbc/0x510 (unreliable) tce_iommu_attach_group+0x24c/0x340 [vfio_iommu_spapr_tce] vfio_container_attach_group+0xec/0x240 [vfio] vfio_group_fops_unl_ioctl+0x548/0xb00 [vfio] sys_ioctl+0x754/0x1580 system_call_exception+0x13c/0x330 system_call_vectored_common+0x15c/0x2ec <snip> --- interrupt: 3000 Fix this by having null check for the tbl passed to the spapr_tce_unset_window().

AI-Powered Analysis

AILast updated: 06/30/2025, 08:26:13 UTC

Technical Analysis

CVE-2025-21713 is a vulnerability identified in the Linux kernel specifically affecting the powerpc/pseries architecture's IOMMU (Input-Output Memory Management Unit) implementation. The flaw arises when a user attempts to use the same VFIO (Virtual Function I/O) container across different IOMMU groups. In this scenario, the function spapr_tce_set_window() returns an error code (-EPERM), indicating a permission issue. However, the subsequent cleanup process does not properly handle this error condition, leading to a NULL pointer dereference in the spapr_tce_unset_window() function. This results in a kernel crash (NULL pointer dereference on read at address 0x00000308), causing a kernel oops and system instability. The root cause is the absence of a null check for the table pointer passed to spapr_tce_unset_window(), which is triggered during the cleanup after a failed attempt to set a window. This vulnerability is specific to the pSeries platform running Linux and involves the VFIO IOMMU driver stack. Exploitation could lead to denial of service (DoS) by crashing the kernel, potentially impacting system availability. The vulnerability does not require user interaction beyond issuing the ioctl system call to attach groups to VFIO containers, which is a privileged operation. No known exploits are currently reported in the wild, and the issue has been addressed by adding the necessary null pointer checks in the kernel source code.

Potential Impact

For European organizations utilizing Linux on IBM pSeries hardware or similar PowerPC-based systems, this vulnerability poses a risk of kernel crashes leading to denial of service conditions. Such outages could disrupt critical services, especially in sectors relying on high-availability computing environments such as finance, telecommunications, and government infrastructure. Since the vulnerability is triggered by improper handling of VFIO container attachments across IOMMU groups, it could be exploited by malicious insiders or compromised privileged users to destabilize systems. Although no remote exploitation vector is indicated, the impact on system availability and potential for service disruption is significant. Organizations running virtualized environments or containerized workloads on affected platforms may experience interruptions, complicating operational continuity. Given the niche hardware affected, the overall impact is limited to environments using PowerPC pSeries Linux kernels, but for those affected, the risk of unexpected kernel panics and system downtime is non-trivial.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the fixed version that includes the null pointer check in spapr_tce_unset_window(). Kernel updates should be sourced from trusted vendors or distributions that have incorporated the patch. Additionally, organizations should audit their use of VFIO containers and IOMMU group attachments on pSeries systems to ensure that container sharing across groups is managed correctly and minimized. Restricting privileged user access to VFIO-related ioctl calls can reduce the risk of accidental or malicious triggering of this vulnerability. Implementing robust monitoring for kernel oops and crash logs can help detect exploitation attempts early. For environments where immediate patching is not feasible, consider isolating affected systems or limiting the use of VFIO containers to trusted workloads only. Engaging with hardware and Linux distribution vendors for guidance and support on patch deployment is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.752Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe8588

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 6/30/2025, 8:26:13 AM

Last updated: 8/12/2025, 11:45:32 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats