CVE-2025-21833

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21833
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21833.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21833
Downstream
Related
Published
2025-03-06T16:22:34Z
Modified
2025-11-02T20:42:13.659036Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Avoid use of NULL after WARNONONCE

There is a WARNONONCE to catch an unlikely situation when domainremovedev_pasid can't find the pasid. In case it nevertheless happens we must avoid using a NULL pointer.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d87731f609318a27e9aa3d01cf97798599d32839
Fixed
68ec78beb4a3fb0877cbaaf49758c85410c05977
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d87731f609318a27e9aa3d01cf97798599d32839
Fixed
df96876be3b064aefc493f760e0639765d13ed0d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d87731f609318a27e9aa3d01cf97798599d32839
Fixed
60f030f7418d3f1d94f2fb207fe3080e1844630b

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.2
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.12.26
v6.12.27
v6.12.28
v6.12.29
v6.12.3
v6.12.30
v6.12.31
v6.12.32
v6.12.33
v6.12.34
v6.12.35
v6.12.36
v6.12.37
v6.12.38
v6.12.39
v6.12.4
v6.12.40
v6.12.41
v6.12.42
v6.12.43
v6.12.44
v6.12.45
v6.12.46
v6.12.47
v6.12.48
v6.12.49
v6.12.5
v6.12.50
v6.12.51
v6.12.52
v6.12.53
v6.12.54
v6.12.55
v6.12.56
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1
v6.13.2
v6.6
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68ec78beb4a3fb0877cbaaf49758c85410c05977",
        "digest": {
            "line_hashes": [
                "97199678793023412428828971824849102841",
                "326894924930569390715525073321515158193",
                "97070064277292298095185293045570926286",
                "110326337964642096653191624435549494009",
                "188316938604445554139582925095755885147",
                "118406893456142553950968178087996078186",
                "141358400520230902199150852691319269730",
                "314766339513973919865000044712010684432",
                "39483167354143248122102698094584334513"
            ],
            "threshold": 0.9
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "id": "CVE-2025-21833-351bd647",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68ec78beb4a3fb0877cbaaf49758c85410c05977",
        "digest": {
            "function_hash": "119634563140058127458429468061925205822",
            "length": 771.0
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2025-21833-5a77f802",
        "target": {
            "function": "intel_iommu_remove_dev_pasid",
            "file": "drivers/iommu/intel/iommu.c"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@df96876be3b064aefc493f760e0639765d13ed0d",
        "digest": {
            "line_hashes": [
                "97199678793023412428828971824849102841",
                "326894924930569390715525073321515158193",
                "97070064277292298095185293045570926286",
                "110326337964642096653191624435549494009",
                "188316938604445554139582925095755885147",
                "118406893456142553950968178087996078186",
                "185272617023971331142085144584122336686",
                "220336217703473304528072312047690122608",
                "281914355668409029387940695819608279144"
            ],
            "threshold": 0.9
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "id": "CVE-2025-21833-600dc53c",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@df96876be3b064aefc493f760e0639765d13ed0d",
        "digest": {
            "function_hash": "288243670092252425234587115741851244565",
            "length": 669.0
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2025-21833-8efcc491",
        "target": {
            "function": "domain_remove_dev_pasid",
            "file": "drivers/iommu/intel/iommu.c"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@60f030f7418d3f1d94f2fb207fe3080e1844630b",
        "digest": {
            "line_hashes": [
                "97199678793023412428828971824849102841",
                "326894924930569390715525073321515158193",
                "97070064277292298095185293045570926286",
                "110326337964642096653191624435549494009",
                "188316938604445554139582925095755885147",
                "118406893456142553950968178087996078186",
                "185272617023971331142085144584122336686",
                "220336217703473304528072312047690122608",
                "281914355668409029387940695819608279144"
            ],
            "threshold": 0.9
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "id": "CVE-2025-21833-c601cc15",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@60f030f7418d3f1d94f2fb207fe3080e1844630b",
        "digest": {
            "function_hash": "288243670092252425234587115741851244565",
            "length": 669.0
        },
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "id": "CVE-2025-21833-f244be0b",
        "target": {
            "function": "domain_remove_dev_pasid",
            "file": "drivers/iommu/intel/iommu.c"
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.57
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.3