{"vulnerability": "CVE-2025-37889", "sightings": [{"uuid": "2080aad3-8dbb-4cd3-a8f9-31a265331677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37889", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lotadoxxk232", "content": "", "creation_timestamp": "2025-05-10T15:17:35.831710Z"}, {"uuid": "896beb79-c60c-43b7-a798-9bcf9ec52c89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37889", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lopz7ylxro2h", "content": "", "creation_timestamp": "2025-05-09T08:31:48.116554Z"}, {"uuid": "b0c0cdd1-7ae5-4933-9657-151f1682dba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37889", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3lopwpj3tvyu2", "content": "", "creation_timestamp": "2025-05-09T09:21:37.069304Z"}, {"uuid": "01f2ea70-7f5e-4091-8262-6f3d64018370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37889", "type": "seen", "source": "https://t.me/cvedetector/24923", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-37889 - XEN PCI MSI NULL Pointer Dereference Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-37889 \nPublished : May 9, 2025, 7:16 a.m. | 44\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nPCI/MSI: Handle the NOMASK flag correctly for all PCI/MSI backends  \n  \nThe conversion of the XEN specific global variable pci_msi_ignore_mask to a  \nMSI domain flag, missed the facts that:  \n  \n    1) Legacy architectures do not provide a interrupt domain  \n    2) Parent MSI domains do not necessarily have a domain info attached  \n     \nBoth cases result in an unconditional NULL pointer dereference. This was  \nunfortunatly missed in review and testing revealed it late.  \n  \nCure this by using the existing pci_msi_domain_supports() helper, which  \nhandles all possible cases correctly. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T10:21:47.000000Z"}, {"uuid": "69fc8a5a-03fb-48e4-8352-f524bde3c6b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37889", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15684", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37889\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/MSI: Handle the NOMASK flag correctly for all PCI/MSI backends\n\nThe conversion of the XEN specific global variable pci_msi_ignore_mask to a\nMSI domain flag, missed the facts that:\n\n    1) Legacy architectures do not provide a interrupt domain\n    2) Parent MSI domains do not necessarily have a domain info attached\n   \nBoth cases result in an unconditional NULL pointer dereference. This was\nunfortunatly missed in review and testing revealed it late.\n\nCure this by using the existing pci_msi_domain_supports() helper, which\nhandles all possible cases correctly.\n\ud83d\udccf Published: 2025-05-09T06:45:50.868Z\n\ud83d\udccf Modified: 2025-05-09T06:45:50.868Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/46d357520934eef99fa121889f8ebbf46a6eddb8\n2. https://git.kernel.org/stable/c/2e3ad60b8f72a95e3a32ddd9d70ea129aa3fcfb7\n3. https://git.kernel.org/stable/c/3ece3e8e5976c49c3f887e5923f998eabd54ff40", "creation_timestamp": "2025-05-09T07:25:24.000000Z"}]}