CVE-2025-21713: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/iommu: Don't unset window if it was never set On pSeries, when user attempts to use the same vfio container used by different iommu group, the spapr_tce_set_window() returns -EPERM and the subsequent cleanup leads to the below crash. Kernel attempted to read user page (308) - exploit attempt? BUG: Kernel NULL pointer dereference on read at 0x00000308 Faulting instruction address: 0xc0000000001ce358 Oops: Kernel access of bad area, sig: 11 [#1] NIP: c0000000001ce358 LR: c0000000001ce05c CTR: c00000000005add0 <snip> NIP [c0000000001ce358] spapr_tce_unset_window+0x3b8/0x510 LR [c0000000001ce05c] spapr_tce_unset_window+0xbc/0x510 Call Trace: spapr_tce_unset_window+0xbc/0x510 (unreliable) tce_iommu_attach_group+0x24c/0x340 [vfio_iommu_spapr_tce] vfio_container_attach_group+0xec/0x240 [vfio] vfio_group_fops_unl_ioctl+0x548/0xb00 [vfio] sys_ioctl+0x754/0x1580 system_call_exception+0x13c/0x330 system_call_vectored_common+0x15c/0x2ec <snip> --- interrupt: 3000 Fix this by having null check for the tbl passed to the spapr_tce_unset_window().
AI Analysis
Technical Summary
CVE-2025-21713 is a vulnerability identified in the Linux kernel specifically affecting the powerpc/pseries architecture's IOMMU (Input-Output Memory Management Unit) implementation. The flaw arises when a user attempts to use the same VFIO (Virtual Function I/O) container across different IOMMU groups. In this scenario, the function spapr_tce_set_window() returns an error code (-EPERM), indicating a permission issue. However, the subsequent cleanup process does not properly handle this error condition, leading to a NULL pointer dereference in the spapr_tce_unset_window() function. This results in a kernel crash (NULL pointer dereference on read at address 0x00000308), causing a kernel oops and system instability. The root cause is the absence of a null check for the table pointer passed to spapr_tce_unset_window(), which is triggered during the cleanup after a failed attempt to set a window. This vulnerability is specific to the pSeries platform running Linux and involves the VFIO IOMMU driver stack. Exploitation could lead to denial of service (DoS) by crashing the kernel, potentially impacting system availability. The vulnerability does not require user interaction beyond issuing the ioctl system call to attach groups to VFIO containers, which is a privileged operation. No known exploits are currently reported in the wild, and the issue has been addressed by adding the necessary null pointer checks in the kernel source code.
Potential Impact
For European organizations utilizing Linux on IBM pSeries hardware or similar PowerPC-based systems, this vulnerability poses a risk of kernel crashes leading to denial of service conditions. Such outages could disrupt critical services, especially in sectors relying on high-availability computing environments such as finance, telecommunications, and government infrastructure. Since the vulnerability is triggered by improper handling of VFIO container attachments across IOMMU groups, it could be exploited by malicious insiders or compromised privileged users to destabilize systems. Although no remote exploitation vector is indicated, the impact on system availability and potential for service disruption is significant. Organizations running virtualized environments or containerized workloads on affected platforms may experience interruptions, complicating operational continuity. Given the niche hardware affected, the overall impact is limited to environments using PowerPC pSeries Linux kernels, but for those affected, the risk of unexpected kernel panics and system downtime is non-trivial.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the fixed version that includes the null pointer check in spapr_tce_unset_window(). Kernel updates should be sourced from trusted vendors or distributions that have incorporated the patch. Additionally, organizations should audit their use of VFIO containers and IOMMU group attachments on pSeries systems to ensure that container sharing across groups is managed correctly and minimized. Restricting privileged user access to VFIO-related ioctl calls can reduce the risk of accidental or malicious triggering of this vulnerability. Implementing robust monitoring for kernel oops and crash logs can help detect exploitation attempts early. For environments where immediate patching is not feasible, consider isolating affected systems or limiting the use of VFIO containers to trusted workloads only. Engaging with hardware and Linux distribution vendors for guidance and support on patch deployment is also recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-21713: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/iommu: Don't unset window if it was never set On pSeries, when user attempts to use the same vfio container used by different iommu group, the spapr_tce_set_window() returns -EPERM and the subsequent cleanup leads to the below crash. Kernel attempted to read user page (308) - exploit attempt? BUG: Kernel NULL pointer dereference on read at 0x00000308 Faulting instruction address: 0xc0000000001ce358 Oops: Kernel access of bad area, sig: 11 [#1] NIP: c0000000001ce358 LR: c0000000001ce05c CTR: c00000000005add0 <snip> NIP [c0000000001ce358] spapr_tce_unset_window+0x3b8/0x510 LR [c0000000001ce05c] spapr_tce_unset_window+0xbc/0x510 Call Trace: spapr_tce_unset_window+0xbc/0x510 (unreliable) tce_iommu_attach_group+0x24c/0x340 [vfio_iommu_spapr_tce] vfio_container_attach_group+0xec/0x240 [vfio] vfio_group_fops_unl_ioctl+0x548/0xb00 [vfio] sys_ioctl+0x754/0x1580 system_call_exception+0x13c/0x330 system_call_vectored_common+0x15c/0x2ec <snip> --- interrupt: 3000 Fix this by having null check for the tbl passed to the spapr_tce_unset_window().
AI-Powered Analysis
Technical Analysis
CVE-2025-21713 is a vulnerability identified in the Linux kernel specifically affecting the powerpc/pseries architecture's IOMMU (Input-Output Memory Management Unit) implementation. The flaw arises when a user attempts to use the same VFIO (Virtual Function I/O) container across different IOMMU groups. In this scenario, the function spapr_tce_set_window() returns an error code (-EPERM), indicating a permission issue. However, the subsequent cleanup process does not properly handle this error condition, leading to a NULL pointer dereference in the spapr_tce_unset_window() function. This results in a kernel crash (NULL pointer dereference on read at address 0x00000308), causing a kernel oops and system instability. The root cause is the absence of a null check for the table pointer passed to spapr_tce_unset_window(), which is triggered during the cleanup after a failed attempt to set a window. This vulnerability is specific to the pSeries platform running Linux and involves the VFIO IOMMU driver stack. Exploitation could lead to denial of service (DoS) by crashing the kernel, potentially impacting system availability. The vulnerability does not require user interaction beyond issuing the ioctl system call to attach groups to VFIO containers, which is a privileged operation. No known exploits are currently reported in the wild, and the issue has been addressed by adding the necessary null pointer checks in the kernel source code.
Potential Impact
For European organizations utilizing Linux on IBM pSeries hardware or similar PowerPC-based systems, this vulnerability poses a risk of kernel crashes leading to denial of service conditions. Such outages could disrupt critical services, especially in sectors relying on high-availability computing environments such as finance, telecommunications, and government infrastructure. Since the vulnerability is triggered by improper handling of VFIO container attachments across IOMMU groups, it could be exploited by malicious insiders or compromised privileged users to destabilize systems. Although no remote exploitation vector is indicated, the impact on system availability and potential for service disruption is significant. Organizations running virtualized environments or containerized workloads on affected platforms may experience interruptions, complicating operational continuity. Given the niche hardware affected, the overall impact is limited to environments using PowerPC pSeries Linux kernels, but for those affected, the risk of unexpected kernel panics and system downtime is non-trivial.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the fixed version that includes the null pointer check in spapr_tce_unset_window(). Kernel updates should be sourced from trusted vendors or distributions that have incorporated the patch. Additionally, organizations should audit their use of VFIO containers and IOMMU group attachments on pSeries systems to ensure that container sharing across groups is managed correctly and minimized. Restricting privileged user access to VFIO-related ioctl calls can reduce the risk of accidental or malicious triggering of this vulnerability. Implementing robust monitoring for kernel oops and crash logs can help detect exploitation attempts early. For environments where immediate patching is not feasible, consider isolating affected systems or limiting the use of VFIO containers to trusted workloads only. Engaging with hardware and Linux distribution vendors for guidance and support on patch deployment is also recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.752Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8588
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 6/30/2025, 8:26:13 AM
Last updated: 8/12/2025, 11:45:32 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.