CVE-2025-21833
iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE There is a WARN_ON_ONCE to catch an unlikely situation when domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless happens we must avoid using a NULL pointer.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 6, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
d87731f609318a27e9aa3d01cf97798599d32839 < 68ec78beb4a3fb0877cbaaf49758c85410c05977 d87731f609318a27e9aa3d01cf97798599d32839 < df96876be3b064aefc493f760e0639765d13ed0d d87731f609318a27e9aa3d01cf97798599d32839 < 60f030f7418d3f1d94f2fb207fe3080e1844630b
Linux / Linux
6.7