Skip to main content

CVE-2025-21873: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-21873cvecve-2025-21873
Published: Thu Mar 27 2025 (03/27/2025, 14:57:04 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: bsg: Fix crash when arpmb command fails If the device doesn't support arpmb we'll crash due to copying user data in bsg_transport_sg_io_fn(). In the case where ufs_bsg_exec_advanced_rpmb_req() returns an error, do not set the job's reply_len. Memory crash backtrace: 3,1290,531166405,-;ufshcd 0000:00:12.5: ARPMB OP failed: error code -22 4,1308,531166555,-;Call Trace: 4,1309,531166559,-; <TASK> 4,1310,531166565,-; ? show_regs+0x6d/0x80 4,1311,531166575,-; ? die+0x37/0xa0 4,1312,531166583,-; ? do_trap+0xd4/0xf0 4,1313,531166593,-; ? do_error_trap+0x71/0xb0 4,1314,531166601,-; ? usercopy_abort+0x6c/0x80 4,1315,531166610,-; ? exc_invalid_op+0x52/0x80 4,1316,531166622,-; ? usercopy_abort+0x6c/0x80 4,1317,531166630,-; ? asm_exc_invalid_op+0x1b/0x20 4,1318,531166643,-; ? usercopy_abort+0x6c/0x80 4,1319,531166652,-; __check_heap_object+0xe3/0x120 4,1320,531166661,-; check_heap_object+0x185/0x1d0 4,1321,531166670,-; __check_object_size.part.0+0x72/0x150 4,1322,531166679,-; __check_object_size+0x23/0x30 4,1323,531166688,-; bsg_transport_sg_io_fn+0x314/0x3b0

AI-Powered Analysis

AILast updated: 06/30/2025, 10:11:04 UTC

Technical Analysis

CVE-2025-21873 is a vulnerability identified in the Linux kernel specifically within the SCSI UFS (Universal Flash Storage) core's block storage generic (bsg) interface. The flaw arises when the kernel attempts to handle an ARPMB (Authenticated Replay Protected Memory Block) command that fails on devices that do not support this command. The vulnerability manifests as a crash caused by improper handling of user data copying in the function bsg_transport_sg_io_fn(). More precisely, when the function ufs_bsg_exec_advanced_rpmb_req() returns an error, the kernel erroneously sets the job's reply length, leading to a memory crash. The crash backtrace indicates that invalid operations and usercopy aborts occur, which are symptomatic of kernel memory corruption or invalid memory access. This vulnerability can cause a denial of service (DoS) by crashing the kernel, potentially leading to system instability or reboot. The issue affects Linux kernel versions identified by the commit hash 6ff265fc5ef660499e0edc4641647e99eed3f519 and was published on March 27, 2025. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability is rooted in the kernel's failure to correctly handle error conditions from UFS devices that do not support the ARPMB command, resulting in unsafe memory operations and kernel crashes.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with UFS storage devices, which are common in embedded systems, mobile devices, and some server environments. The impact is mainly a denial of service condition caused by kernel crashes, which can disrupt critical services, cause data loss, or require system reboots. Organizations relying on Linux-based infrastructure for critical applications, especially those using UFS storage, may experience operational downtime. Although no remote code execution or privilege escalation is indicated, the instability introduced can be exploited in targeted attacks to degrade service availability. This is particularly relevant for sectors such as telecommunications, manufacturing, and IoT deployments prevalent in Europe, where embedded Linux systems are widespread. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any unpatched system remains susceptible to crashes triggered by malformed or unsupported ARPMB commands.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the latest patched version that addresses CVE-2025-21873. Since the issue arises from improper error handling in the UFS bsg interface, applying vendor-supplied kernel patches or upgrading to a kernel version that includes the fix is essential. Organizations should audit their systems to identify devices using UFS storage and verify kernel versions. For embedded or specialized devices where kernel upgrades are challenging, consider disabling or restricting access to the bsg interface or UFS devices if feasible. Additionally, implementing kernel crash monitoring and automated recovery mechanisms can reduce downtime impact. Network segmentation and strict access controls can limit exposure by preventing untrusted users or processes from issuing ARPMB commands. Finally, maintain vigilance for any emerging exploit reports and coordinate with Linux kernel maintainers and vendors for timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-29T08:45:45.781Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9832c4522896dcbe8aa5

Added to database: 5/21/2025, 9:09:06 AM

Last enriched: 6/30/2025, 10:11:04 AM

Last updated: 8/1/2025, 6:51:53 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats