Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21833— iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE

EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-21833

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE There is a WARN_ON_ONCE to catch an unlikely situation when domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless happens we must avoid using a NULL pointer.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于iommu/vt-d模块在WARN_ON_ONCE触发后未正确处理NULL指针,可能导致使用空指针。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d87731f609318a27e9aa3d01cf97798599d32839 ~ 68ec78beb4a3fb0877cbaaf49758c85410c05977 -
LinuxLinux 6.7 -

II. Public POCs for CVE-2025-21833

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-21833

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-03-06 · 46 CVEs total

CVE-2024-58063wifi: rtlwifi: fix memory leaks and invalid access at probe error path
CVE-2024-58060bpf: Reject struct_ops registration that uses module ptr and the module btf_id is missing
CVE-2024-58058ubifs: skip dumping tnc tree when zroot is null
CVE-2024-58055usb: gadget: f_tcm: Don't free command immediately
CVE-2024-58053rxrpc: Fix handling of received connection abort
CVE-2024-58054staging: media: max96712: fix kernel oops when removing module
CVE-2024-58052drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
CVE-2024-58051ipmi: ipmb: Add check devm_kasprintf() returned value
CVE-2024-58056remoteproc: core: Fix ida_free call while not allocated
CVE-2024-58062wifi: iwlwifi: mvm: avoid NULL pointer dereference
CVE-2024-58061wifi: mac80211: prohibit deactivating all links
CVE-2024-58064wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap(
CVE-2024-58065clk: mmp: pxa1908-apbc: Fix NULL vs IS_ERR() check
CVE-2024-58066clk: mmp: pxa1908-apbcp: Fix a NULL vs IS_ERR() check
CVE-2024-58067clk: mmp: pxa1908-mpmu: Fix a NULL vs IS_ERR() check
CVE-2024-58069rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
CVE-2024-58068OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized
CVE-2024-58070bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT
CVE-2024-58071team: prevent adding a device which is already a team device lower
CVE-2024-58072wifi: rtlwifi: remove unused check_buddy_priv

Showing top 20 of 46 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-21833

No comments yet


Leave a comment