In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
There is a WARN_ON_ONCE to catch an unlikely situation when
domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless
happens we must avoid using a NULL pointer.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Mar 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| Weaknesses | CWE-476 | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linux
Linux linux Kernel |
Fri, 07 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 06 Mar 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE There is a WARN_ON_ONCE to catch an unlikely situation when domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless happens we must avoid using a NULL pointer. | |
| Title | iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-03-06T16:22:34.798Z
Updated: 2025-10-01T19:36:35.536Z
Reserved: 2024-12-29T08:45:45.777Z
Link: CVE-2025-21833
No data.
Status : Modified
Published: 2025-03-06T17:15:23.293
Modified: 2025-10-01T20:18:27.467
Link: CVE-2025-21833