{"uuid": "e2a8f0b5-cd8c-424c-9c47-26f3f222e9f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21833", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21833\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Avoid use of NULL after WARN_ON_ONCE\n\nThere is a WARN_ON_ONCE to catch an unlikely situation when\ndomain_remove_dev_pasid can't find the `pasid`. In case it nevertheless\nhappens we must avoid using a NULL pointer.\n\ud83d\udccf Published: 2025-03-06T16:22:34.798Z\n\ud83d\udccf Modified: 2025-03-06T16:22:34.798Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/df96876be3b064aefc493f760e0639765d13ed0d\n2. https://git.kernel.org/stable/c/60f030f7418d3f1d94f2fb207fe3080e1844630b", "creation_timestamp": "2025-03-06T16:34:01.000000Z"}