CVE-2025-21935

Source
https://cve.org/CVERecord?id=CVE-2025-21935
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21935.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21935
Downstream
Related
Published
2025-04-01T15:41:03.335Z
Modified
2026-03-20T12:41:14.756225Z
Summary
rapidio: add check for rio_add_net() in rio_scan_alloc_net()
Details

In the Linux kernel, the following vulnerability has been resolved:

rapidio: add check for rioaddnet() in rioscanalloc_net()

The return value of rioaddnet() should be checked. If it fails, putdevice() should be called to free the memory and give up the reference initialized in rioadd_net().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21935.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e6b585ca6e81badeb3d42db3cc408174f2826034
Fixed
6d22953c4a183d0b7fdf34d68c5debd16da6edc5
Fixed
4f3509cfcc02e9d757f2714bb7dbbeec35de6fa7
Fixed
181d4daaefb3bceeb2f2635ba9f3781eeda9e550
Fixed
ad82be4298a89a9ae46f07128bdf3d8614bce745
Fixed
e6411c3b9512dba09af7d014d474516828c89706
Fixed
c332f3e2df0fcae5a45fd55cc18902fb1e4825ca
Fixed
a0d069ccc475abaaa79c6368ee27fc0b5912bea8
Fixed
e842f9a1edf306bf36fe2a4d847a0b0d458770de

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21935.json"