In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries/iommu: Don't unset window if it was never set
On pSeries, when user attempts to use the same vfio container used by different iommu group, the spaprtceset_window() returns -EPERM and the subsequent cleanup leads to the below crash.
Kernel attempted to read user page (308) - exploit attempt? BUG: Kernel NULL pointer dereference on read at 0x00000308 Faulting instruction address: 0xc0000000001ce358 Oops: Kernel access of bad area, sig: 11 [#1] NIP: c0000000001ce358 LR: c0000000001ce05c CTR: c00000000005add0 <snip> NIP [c0000000001ce358] spaprtceunsetwindow+0x3b8/0x510 LR [c0000000001ce05c] spaprtceunsetwindow+0xbc/0x510 Call Trace: spaprtceunsetwindow+0xbc/0x510 (unreliable) tceiommuattachgroup+0x24c/0x340 [vfioiommuspaprtce] vfiocontainerattachgroup+0xec/0x240 [vfio] vfiogroupfopsunlioctl+0x548/0xb00 [vfio] sysioctl+0x754/0x1580 systemcallexception+0x13c/0x330 systemcallvectoredcommon+0x15c/0x2ec <snip> --- interrupt: 3000
Fix this by having null check for the tbl passed to the spaprtceunset_window().
[
{
"digest": {
"length": 1312.0,
"function_hash": "331703824438996947920449215998950830952"
},
"target": {
"function": "spapr_tce_unset_window",
"file": "arch/powerpc/platforms/pseries/iommu.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@17391cb2613b82f8c405570fea605af3255ff8d2",
"id": "CVE-2025-21713-2261a545"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"222843004229799453622006679874814369008",
"235953033030322541548193763581308830394",
"206860078344226222141764791215309029504"
]
},
"target": {
"file": "arch/powerpc/platforms/pseries/iommu.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b853ff0b514c1df314246fcf94744005914b48cb",
"id": "CVE-2025-21713-45944d01"
},
{
"digest": {
"length": 1312.0,
"function_hash": "331703824438996947920449215998950830952"
},
"target": {
"function": "spapr_tce_unset_window",
"file": "arch/powerpc/platforms/pseries/iommu.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b853ff0b514c1df314246fcf94744005914b48cb",
"id": "CVE-2025-21713-6fe71baa"
},
{
"digest": {
"length": 1312.0,
"function_hash": "331703824438996947920449215998950830952"
},
"target": {
"function": "spapr_tce_unset_window",
"file": "arch/powerpc/platforms/pseries/iommu.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac12372a13dab3f7a2762db240bd180de8ef1e5e",
"id": "CVE-2025-21713-8281e89c"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"222843004229799453622006679874814369008",
"235953033030322541548193763581308830394",
"206860078344226222141764791215309029504"
]
},
"target": {
"file": "arch/powerpc/platforms/pseries/iommu.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac12372a13dab3f7a2762db240bd180de8ef1e5e",
"id": "CVE-2025-21713-dbefec33"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"222843004229799453622006679874814369008",
"235953033030322541548193763581308830394",
"206860078344226222141764791215309029504"
]
},
"target": {
"file": "arch/powerpc/platforms/pseries/iommu.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@17391cb2613b82f8c405570fea605af3255ff8d2",
"id": "CVE-2025-21713-fc462470"
}
]