๐Ÿ” CVE Alert

CVE-2025-21713

MEDIUM 5.5

powerpc/pseries/iommu: Don't unset window if it was never set

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/iommu: Don't unset window if it was never set On pSeries, when user attempts to use the same vfio container used by different iommu group, the spapr_tce_set_window() returns -EPERM and the subsequent cleanup leads to the below crash. Kernel attempted to read user page (308) - exploit attempt? BUG: Kernel NULL pointer dereference on read at 0x00000308 Faulting instruction address: 0xc0000000001ce358 Oops: Kernel access of bad area, sig: 11 [#1] NIP: c0000000001ce358 LR: c0000000001ce05c CTR: c00000000005add0 <snip> NIP [c0000000001ce358] spapr_tce_unset_window+0x3b8/0x510 LR [c0000000001ce05c] spapr_tce_unset_window+0xbc/0x510 Call Trace: spapr_tce_unset_window+0xbc/0x510 (unreliable) tce_iommu_attach_group+0x24c/0x340 [vfio_iommu_spapr_tce] vfio_container_attach_group+0xec/0x240 [vfio] vfio_group_fops_unl_ioctl+0x548/0xb00 [vfio] sys_ioctl+0x754/0x1580 system_call_exception+0x13c/0x330 system_call_vectored_common+0x15c/0x2ec <snip> --- interrupt: 3000 Fix this by having null check for the tbl passed to the spapr_tce_unset_window().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
f431a8cde7f102fce412546db6e62fdbde1131a7 < b853ff0b514c1df314246fcf94744005914b48cb f431a8cde7f102fce412546db6e62fdbde1131a7 < ac12372a13dab3f7a2762db240bd180de8ef1e5e f431a8cde7f102fce412546db6e62fdbde1131a7 < 17391cb2613b82f8c405570fea605af3255ff8d2
Linux / Linux
6.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b853ff0b514c1df314246fcf94744005914b48cb git.kernel.org: https://git.kernel.org/stable/c/ac12372a13dab3f7a2762db240bd180de8ef1e5e git.kernel.org: https://git.kernel.org/stable/c/17391cb2613b82f8c405570fea605af3255ff8d2