CVE-2025-21935

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21935
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21935.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21935
Downstream
Related
Published
2025-04-01T15:41:03.335Z
Modified
2025-11-28T02:34:46.086030Z
Summary
rapidio: add check for rio_add_net() in rio_scan_alloc_net()
Details

In the Linux kernel, the following vulnerability has been resolved:

rapidio: add check for rioaddnet() in rioscanalloc_net()

The return value of rioaddnet() should be checked. If it fails, putdevice() should be called to free the memory and give up the reference initialized in rioadd_net().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21935.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e6b585ca6e81badeb3d42db3cc408174f2826034
Fixed
6d22953c4a183d0b7fdf34d68c5debd16da6edc5
Fixed
4f3509cfcc02e9d757f2714bb7dbbeec35de6fa7
Fixed
181d4daaefb3bceeb2f2635ba9f3781eeda9e550
Fixed
ad82be4298a89a9ae46f07128bdf3d8614bce745
Fixed
e6411c3b9512dba09af7d014d474516828c89706
Fixed
c332f3e2df0fcae5a45fd55cc18902fb1e4825ca
Fixed
a0d069ccc475abaaa79c6368ee27fc0b5912bea8
Fixed
e842f9a1edf306bf36fe2a4d847a0b0d458770de

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.6.0
Fixed
5.4.291
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.235
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.131
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.83
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.19
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.7