In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
There is a WARN_ON_ONCE to catch an unlikely situation when
domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless
happens we must avoid using a NULL pointer.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Mar 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-476 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
Fri, 07 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 06 Mar 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE There is a WARN_ON_ONCE to catch an unlikely situation when domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless happens we must avoid using a NULL pointer. | |
Title | iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-03-06T16:22:34.798Z
Updated: 2025-03-24T15:41:05.912Z
Reserved: 2024-12-29T08:45:45.777Z
Link: CVE-2025-21833

No data.

Status : Analyzed
Published: 2025-03-06T17:15:23.293
Modified: 2025-03-25T14:27:52.403
Link: CVE-2025-21833
