CVE-2025-21873: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: bsg: Fix crash when arpmb command fails If the device doesn't support arpmb we'll crash due to copying user data in bsg_transport_sg_io_fn(). In the case where ufs_bsg_exec_advanced_rpmb_req() returns an error, do not set the job's reply_len. Memory crash backtrace: 3,1290,531166405,-;ufshcd 0000:00:12.5: ARPMB OP failed: error code -22 4,1308,531166555,-;Call Trace: 4,1309,531166559,-; <TASK> 4,1310,531166565,-; ? show_regs+0x6d/0x80 4,1311,531166575,-; ? die+0x37/0xa0 4,1312,531166583,-; ? do_trap+0xd4/0xf0 4,1313,531166593,-; ? do_error_trap+0x71/0xb0 4,1314,531166601,-; ? usercopy_abort+0x6c/0x80 4,1315,531166610,-; ? exc_invalid_op+0x52/0x80 4,1316,531166622,-; ? usercopy_abort+0x6c/0x80 4,1317,531166630,-; ? asm_exc_invalid_op+0x1b/0x20 4,1318,531166643,-; ? usercopy_abort+0x6c/0x80 4,1319,531166652,-; __check_heap_object+0xe3/0x120 4,1320,531166661,-; check_heap_object+0x185/0x1d0 4,1321,531166670,-; __check_object_size.part.0+0x72/0x150 4,1322,531166679,-; __check_object_size+0x23/0x30 4,1323,531166688,-; bsg_transport_sg_io_fn+0x314/0x3b0
AI Analysis
Technical Summary
CVE-2025-21873 is a vulnerability identified in the Linux kernel specifically within the SCSI UFS (Universal Flash Storage) core's block storage generic (bsg) interface. The flaw arises when the kernel attempts to handle an ARPMB (Authenticated Replay Protected Memory Block) command that fails on devices that do not support this command. The vulnerability manifests as a crash caused by improper handling of user data copying in the function bsg_transport_sg_io_fn(). More precisely, when the function ufs_bsg_exec_advanced_rpmb_req() returns an error, the kernel erroneously sets the job's reply length, leading to a memory crash. The crash backtrace indicates that invalid operations and usercopy aborts occur, which are symptomatic of kernel memory corruption or invalid memory access. This vulnerability can cause a denial of service (DoS) by crashing the kernel, potentially leading to system instability or reboot. The issue affects Linux kernel versions identified by the commit hash 6ff265fc5ef660499e0edc4641647e99eed3f519 and was published on March 27, 2025. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability is rooted in the kernel's failure to correctly handle error conditions from UFS devices that do not support the ARPMB command, resulting in unsafe memory operations and kernel crashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with UFS storage devices, which are common in embedded systems, mobile devices, and some server environments. The impact is mainly a denial of service condition caused by kernel crashes, which can disrupt critical services, cause data loss, or require system reboots. Organizations relying on Linux-based infrastructure for critical applications, especially those using UFS storage, may experience operational downtime. Although no remote code execution or privilege escalation is indicated, the instability introduced can be exploited in targeted attacks to degrade service availability. This is particularly relevant for sectors such as telecommunications, manufacturing, and IoT deployments prevalent in Europe, where embedded Linux systems are widespread. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any unpatched system remains susceptible to crashes triggered by malformed or unsupported ARPMB commands.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the latest patched version that addresses CVE-2025-21873. Since the issue arises from improper error handling in the UFS bsg interface, applying vendor-supplied kernel patches or upgrading to a kernel version that includes the fix is essential. Organizations should audit their systems to identify devices using UFS storage and verify kernel versions. For embedded or specialized devices where kernel upgrades are challenging, consider disabling or restricting access to the bsg interface or UFS devices if feasible. Additionally, implementing kernel crash monitoring and automated recovery mechanisms can reduce downtime impact. Network segmentation and strict access controls can limit exposure by preventing untrusted users or processes from issuing ARPMB commands. Finally, maintain vigilance for any emerging exploit reports and coordinate with Linux kernel maintainers and vendors for timely updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-21873: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: bsg: Fix crash when arpmb command fails If the device doesn't support arpmb we'll crash due to copying user data in bsg_transport_sg_io_fn(). In the case where ufs_bsg_exec_advanced_rpmb_req() returns an error, do not set the job's reply_len. Memory crash backtrace: 3,1290,531166405,-;ufshcd 0000:00:12.5: ARPMB OP failed: error code -22 4,1308,531166555,-;Call Trace: 4,1309,531166559,-; <TASK> 4,1310,531166565,-; ? show_regs+0x6d/0x80 4,1311,531166575,-; ? die+0x37/0xa0 4,1312,531166583,-; ? do_trap+0xd4/0xf0 4,1313,531166593,-; ? do_error_trap+0x71/0xb0 4,1314,531166601,-; ? usercopy_abort+0x6c/0x80 4,1315,531166610,-; ? exc_invalid_op+0x52/0x80 4,1316,531166622,-; ? usercopy_abort+0x6c/0x80 4,1317,531166630,-; ? asm_exc_invalid_op+0x1b/0x20 4,1318,531166643,-; ? usercopy_abort+0x6c/0x80 4,1319,531166652,-; __check_heap_object+0xe3/0x120 4,1320,531166661,-; check_heap_object+0x185/0x1d0 4,1321,531166670,-; __check_object_size.part.0+0x72/0x150 4,1322,531166679,-; __check_object_size+0x23/0x30 4,1323,531166688,-; bsg_transport_sg_io_fn+0x314/0x3b0
AI-Powered Analysis
Technical Analysis
CVE-2025-21873 is a vulnerability identified in the Linux kernel specifically within the SCSI UFS (Universal Flash Storage) core's block storage generic (bsg) interface. The flaw arises when the kernel attempts to handle an ARPMB (Authenticated Replay Protected Memory Block) command that fails on devices that do not support this command. The vulnerability manifests as a crash caused by improper handling of user data copying in the function bsg_transport_sg_io_fn(). More precisely, when the function ufs_bsg_exec_advanced_rpmb_req() returns an error, the kernel erroneously sets the job's reply length, leading to a memory crash. The crash backtrace indicates that invalid operations and usercopy aborts occur, which are symptomatic of kernel memory corruption or invalid memory access. This vulnerability can cause a denial of service (DoS) by crashing the kernel, potentially leading to system instability or reboot. The issue affects Linux kernel versions identified by the commit hash 6ff265fc5ef660499e0edc4641647e99eed3f519 and was published on March 27, 2025. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet. The vulnerability is rooted in the kernel's failure to correctly handle error conditions from UFS devices that do not support the ARPMB command, resulting in unsafe memory operations and kernel crashes.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with UFS storage devices, which are common in embedded systems, mobile devices, and some server environments. The impact is mainly a denial of service condition caused by kernel crashes, which can disrupt critical services, cause data loss, or require system reboots. Organizations relying on Linux-based infrastructure for critical applications, especially those using UFS storage, may experience operational downtime. Although no remote code execution or privilege escalation is indicated, the instability introduced can be exploited in targeted attacks to degrade service availability. This is particularly relevant for sectors such as telecommunications, manufacturing, and IoT deployments prevalent in Europe, where embedded Linux systems are widespread. The lack of known exploits reduces immediate risk, but the vulnerability's presence in the kernel means that any unpatched system remains susceptible to crashes triggered by malformed or unsupported ARPMB commands.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to the latest patched version that addresses CVE-2025-21873. Since the issue arises from improper error handling in the UFS bsg interface, applying vendor-supplied kernel patches or upgrading to a kernel version that includes the fix is essential. Organizations should audit their systems to identify devices using UFS storage and verify kernel versions. For embedded or specialized devices where kernel upgrades are challenging, consider disabling or restricting access to the bsg interface or UFS devices if feasible. Additionally, implementing kernel crash monitoring and automated recovery mechanisms can reduce downtime impact. Network segmentation and strict access controls can limit exposure by preventing untrusted users or processes from issuing ARPMB commands. Finally, maintain vigilance for any emerging exploit reports and coordinate with Linux kernel maintainers and vendors for timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-29T08:45:45.781Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8aa5
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 6/30/2025, 10:11:04 AM
Last updated: 8/1/2025, 6:51:53 AM
Views: 12
Related Threats
Top Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.