Skip to main content

CVE-2025-21723: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2025-21723cvecve-2025-21723
Published: Thu Feb 27 2025 (02/27/2025, 02:07:30 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix possible crash when setting up bsg fails If bsg_setup_queue() fails, the bsg_queue is assigned a non-NULL value. Consequently, in mpi3mr_bsg_exit(), the condition "if(!mrioc->bsg_queue)" will not be satisfied, preventing execution from entering bsg_remove_queue(), which could lead to the following crash: BUG: kernel NULL pointer dereference, address: 000000000000041c Call Trace: <TASK> mpi3mr_bsg_exit+0x1f/0x50 [mpi3mr] mpi3mr_remove+0x6f/0x340 [mpi3mr] pci_device_remove+0x3f/0xb0 device_release_driver_internal+0x19d/0x220 unbind_store+0xa4/0xb0 kernfs_fop_write_iter+0x11f/0x200 vfs_write+0x1fc/0x3e0 ksys_write+0x67/0xe0 do_syscall_64+0x38/0x80 entry_SYSCALL_64_after_hwframe+0x78/0xe2

AI-Powered Analysis

AILast updated: 06/30/2025, 08:27:53 UTC

Technical Analysis

CVE-2025-21723 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically within the mpi3mr driver which handles certain SCSI devices. The issue arises when the function bsg_setup_queue() fails during the setup of the block storage gateway (bsg) queue. In this failure scenario, the bsg_queue pointer is incorrectly assigned a non-NULL value. Later, when mpi3mr_bsg_exit() is called during device removal or driver unload, it checks if the bsg_queue pointer is NULL to decide whether to call bsg_remove_queue(). Due to the erroneous non-NULL assignment, this condition is not met, and bsg_remove_queue() is not invoked. This leads to a use-after-free or null pointer dereference scenario, causing a kernel crash with a BUG message referencing a NULL pointer dereference at a low memory address (0x000000000000041c). The crash occurs in the call stack involving mpi3mr_bsg_exit(), mpi3mr_remove(), pci_device_remove(), and related kernel functions. This vulnerability can cause a denial of service (DoS) by crashing the kernel when the affected driver attempts to remove or unbind the device. The issue has been fixed by correcting the bsg_queue assignment logic to ensure proper cleanup and avoid the crash. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the mpi3mr driver with the faulty code, as indicated by the affected version hashes provided.

Potential Impact

For European organizations, the primary impact of CVE-2025-21723 is a potential denial of service condition on Linux systems using the mpi3mr SCSI driver. This driver is typically used for managing certain SCSI RAID controllers or storage devices. Organizations relying on Linux servers or infrastructure with these specific hardware components could experience unexpected kernel crashes during device removal or driver operations, leading to system downtime and potential disruption of critical services. This could affect data center operations, cloud service providers, and enterprises with storage arrays using affected hardware. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting kernel panic could interrupt business continuity and require system reboots, impacting availability. Given the widespread use of Linux in European IT environments, especially in sectors like finance, telecommunications, and government, any disruption in storage subsystem stability can have significant operational consequences. However, the impact is limited to systems with the affected hardware and driver, and exploitation requires conditions that trigger the driver unload or device removal process.

Mitigation Recommendations

To mitigate CVE-2025-21723, European organizations should: 1) Identify Linux systems running kernels with the mpi3mr driver, particularly those managing SCSI storage controllers that rely on this driver. 2) Apply the latest Linux kernel updates or patches that include the fix for this vulnerability as soon as they become available from trusted Linux distributions or upstream sources. 3) Avoid unnecessary removal or unbinding of devices using the mpi3mr driver until patched, especially in production environments. 4) Implement monitoring to detect kernel panics or crashes related to storage drivers to enable rapid incident response. 5) For critical systems, consider redundancy and failover mechanisms to maintain availability in case of a crash. 6) Test kernel updates in staging environments to ensure compatibility with existing storage hardware and software stacks before deployment. 7) Maintain up-to-date backups of critical data to mitigate risks from unexpected downtime. These steps go beyond generic advice by focusing on hardware-specific driver identification, patch prioritization, and operational controls around device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.754Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe85ee

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 6/30/2025, 8:27:53 AM

Last updated: 8/17/2025, 9:46:35 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats