CVE-2025-21723: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix possible crash when setting up bsg fails If bsg_setup_queue() fails, the bsg_queue is assigned a non-NULL value. Consequently, in mpi3mr_bsg_exit(), the condition "if(!mrioc->bsg_queue)" will not be satisfied, preventing execution from entering bsg_remove_queue(), which could lead to the following crash: BUG: kernel NULL pointer dereference, address: 000000000000041c Call Trace: <TASK> mpi3mr_bsg_exit+0x1f/0x50 [mpi3mr] mpi3mr_remove+0x6f/0x340 [mpi3mr] pci_device_remove+0x3f/0xb0 device_release_driver_internal+0x19d/0x220 unbind_store+0xa4/0xb0 kernfs_fop_write_iter+0x11f/0x200 vfs_write+0x1fc/0x3e0 ksys_write+0x67/0xe0 do_syscall_64+0x38/0x80 entry_SYSCALL_64_after_hwframe+0x78/0xe2
AI Analysis
Technical Summary
CVE-2025-21723 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically within the mpi3mr driver which handles certain SCSI devices. The issue arises when the function bsg_setup_queue() fails during the setup of the block storage gateway (bsg) queue. In this failure scenario, the bsg_queue pointer is incorrectly assigned a non-NULL value. Later, when mpi3mr_bsg_exit() is called during device removal or driver unload, it checks if the bsg_queue pointer is NULL to decide whether to call bsg_remove_queue(). Due to the erroneous non-NULL assignment, this condition is not met, and bsg_remove_queue() is not invoked. This leads to a use-after-free or null pointer dereference scenario, causing a kernel crash with a BUG message referencing a NULL pointer dereference at a low memory address (0x000000000000041c). The crash occurs in the call stack involving mpi3mr_bsg_exit(), mpi3mr_remove(), pci_device_remove(), and related kernel functions. This vulnerability can cause a denial of service (DoS) by crashing the kernel when the affected driver attempts to remove or unbind the device. The issue has been fixed by correcting the bsg_queue assignment logic to ensure proper cleanup and avoid the crash. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the mpi3mr driver with the faulty code, as indicated by the affected version hashes provided.
Potential Impact
For European organizations, the primary impact of CVE-2025-21723 is a potential denial of service condition on Linux systems using the mpi3mr SCSI driver. This driver is typically used for managing certain SCSI RAID controllers or storage devices. Organizations relying on Linux servers or infrastructure with these specific hardware components could experience unexpected kernel crashes during device removal or driver operations, leading to system downtime and potential disruption of critical services. This could affect data center operations, cloud service providers, and enterprises with storage arrays using affected hardware. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting kernel panic could interrupt business continuity and require system reboots, impacting availability. Given the widespread use of Linux in European IT environments, especially in sectors like finance, telecommunications, and government, any disruption in storage subsystem stability can have significant operational consequences. However, the impact is limited to systems with the affected hardware and driver, and exploitation requires conditions that trigger the driver unload or device removal process.
Mitigation Recommendations
To mitigate CVE-2025-21723, European organizations should: 1) Identify Linux systems running kernels with the mpi3mr driver, particularly those managing SCSI storage controllers that rely on this driver. 2) Apply the latest Linux kernel updates or patches that include the fix for this vulnerability as soon as they become available from trusted Linux distributions or upstream sources. 3) Avoid unnecessary removal or unbinding of devices using the mpi3mr driver until patched, especially in production environments. 4) Implement monitoring to detect kernel panics or crashes related to storage drivers to enable rapid incident response. 5) For critical systems, consider redundancy and failover mechanisms to maintain availability in case of a crash. 6) Test kernel updates in staging environments to ensure compatibility with existing storage hardware and software stacks before deployment. 7) Maintain up-to-date backups of critical data to mitigate risks from unexpected downtime. These steps go beyond generic advice by focusing on hardware-specific driver identification, patch prioritization, and operational controls around device management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-21723: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix possible crash when setting up bsg fails If bsg_setup_queue() fails, the bsg_queue is assigned a non-NULL value. Consequently, in mpi3mr_bsg_exit(), the condition "if(!mrioc->bsg_queue)" will not be satisfied, preventing execution from entering bsg_remove_queue(), which could lead to the following crash: BUG: kernel NULL pointer dereference, address: 000000000000041c Call Trace: <TASK> mpi3mr_bsg_exit+0x1f/0x50 [mpi3mr] mpi3mr_remove+0x6f/0x340 [mpi3mr] pci_device_remove+0x3f/0xb0 device_release_driver_internal+0x19d/0x220 unbind_store+0xa4/0xb0 kernfs_fop_write_iter+0x11f/0x200 vfs_write+0x1fc/0x3e0 ksys_write+0x67/0xe0 do_syscall_64+0x38/0x80 entry_SYSCALL_64_after_hwframe+0x78/0xe2
AI-Powered Analysis
Technical Analysis
CVE-2025-21723 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically within the mpi3mr driver which handles certain SCSI devices. The issue arises when the function bsg_setup_queue() fails during the setup of the block storage gateway (bsg) queue. In this failure scenario, the bsg_queue pointer is incorrectly assigned a non-NULL value. Later, when mpi3mr_bsg_exit() is called during device removal or driver unload, it checks if the bsg_queue pointer is NULL to decide whether to call bsg_remove_queue(). Due to the erroneous non-NULL assignment, this condition is not met, and bsg_remove_queue() is not invoked. This leads to a use-after-free or null pointer dereference scenario, causing a kernel crash with a BUG message referencing a NULL pointer dereference at a low memory address (0x000000000000041c). The crash occurs in the call stack involving mpi3mr_bsg_exit(), mpi3mr_remove(), pci_device_remove(), and related kernel functions. This vulnerability can cause a denial of service (DoS) by crashing the kernel when the affected driver attempts to remove or unbind the device. The issue has been fixed by correcting the bsg_queue assignment logic to ensure proper cleanup and avoid the crash. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the mpi3mr driver with the faulty code, as indicated by the affected version hashes provided.
Potential Impact
For European organizations, the primary impact of CVE-2025-21723 is a potential denial of service condition on Linux systems using the mpi3mr SCSI driver. This driver is typically used for managing certain SCSI RAID controllers or storage devices. Organizations relying on Linux servers or infrastructure with these specific hardware components could experience unexpected kernel crashes during device removal or driver operations, leading to system downtime and potential disruption of critical services. This could affect data center operations, cloud service providers, and enterprises with storage arrays using affected hardware. Although this vulnerability does not appear to allow privilege escalation or remote code execution, the resulting kernel panic could interrupt business continuity and require system reboots, impacting availability. Given the widespread use of Linux in European IT environments, especially in sectors like finance, telecommunications, and government, any disruption in storage subsystem stability can have significant operational consequences. However, the impact is limited to systems with the affected hardware and driver, and exploitation requires conditions that trigger the driver unload or device removal process.
Mitigation Recommendations
To mitigate CVE-2025-21723, European organizations should: 1) Identify Linux systems running kernels with the mpi3mr driver, particularly those managing SCSI storage controllers that rely on this driver. 2) Apply the latest Linux kernel updates or patches that include the fix for this vulnerability as soon as they become available from trusted Linux distributions or upstream sources. 3) Avoid unnecessary removal or unbinding of devices using the mpi3mr driver until patched, especially in production environments. 4) Implement monitoring to detect kernel panics or crashes related to storage drivers to enable rapid incident response. 5) For critical systems, consider redundancy and failover mechanisms to maintain availability in case of a crash. 6) Test kernel updates in staging environments to ensure compatibility with existing storage hardware and software stacks before deployment. 7) Maintain up-to-date backups of critical data to mitigate risks from unexpected downtime. These steps go beyond generic advice by focusing on hardware-specific driver identification, patch prioritization, and operational controls around device management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.754Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe85ee
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 6/30/2025, 8:27:53 AM
Last updated: 8/17/2025, 9:46:35 AM
Views: 19
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.