๐Ÿ” CVE Alert

CVE-2025-21833

MEDIUM 5.5

iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE There is a WARN_ON_ONCE to catch an unlikely situation when domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless happens we must avoid using a NULL pointer.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 6, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d87731f609318a27e9aa3d01cf97798599d32839 < 68ec78beb4a3fb0877cbaaf49758c85410c05977 d87731f609318a27e9aa3d01cf97798599d32839 < df96876be3b064aefc493f760e0639765d13ed0d d87731f609318a27e9aa3d01cf97798599d32839 < 60f030f7418d3f1d94f2fb207fe3080e1844630b
Linux / Linux
6.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/68ec78beb4a3fb0877cbaaf49758c85410c05977 git.kernel.org: https://git.kernel.org/stable/c/df96876be3b064aefc493f760e0639765d13ed0d git.kernel.org: https://git.kernel.org/stable/c/60f030f7418d3f1d94f2fb207fe3080e1844630b