{"id":"CVE-2025-21935","summary":"rapidio: add check for rio_add_net() in rio_scan_alloc_net()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nrapidio: add check for rio_add_net() in rio_scan_alloc_net()\n\nThe return value of rio_add_net() should be checked.  If it fails,\nput_device() should be called to free the memory and give up the reference\ninitialized in rio_add_net().","modified":"2026-04-02T12:45:17.546724Z","published":"2025-04-01T15:41:03.335Z","related":["SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1293-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20206-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20283-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21935.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/181d4daaefb3bceeb2f2635ba9f3781eeda9e550"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4f3509cfcc02e9d757f2714bb7dbbeec35de6fa7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6d22953c4a183d0b7fdf34d68c5debd16da6edc5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a0d069ccc475abaaa79c6368ee27fc0b5912bea8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad82be4298a89a9ae46f07128bdf3d8614bce745"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c332f3e2df0fcae5a45fd55cc18902fb1e4825ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e6411c3b9512dba09af7d014d474516828c89706"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e842f9a1edf306bf36fe2a4d847a0b0d458770de"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21935.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21935"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e6b585ca6e81badeb3d42db3cc408174f2826034"},{"fixed":"6d22953c4a183d0b7fdf34d68c5debd16da6edc5"},{"fixed":"4f3509cfcc02e9d757f2714bb7dbbeec35de6fa7"},{"fixed":"181d4daaefb3bceeb2f2635ba9f3781eeda9e550"},{"fixed":"ad82be4298a89a9ae46f07128bdf3d8614bce745"},{"fixed":"e6411c3b9512dba09af7d014d474516828c89706"},{"fixed":"c332f3e2df0fcae5a45fd55cc18902fb1e4825ca"},{"fixed":"a0d069ccc475abaaa79c6368ee27fc0b5912bea8"},{"fixed":"e842f9a1edf306bf36fe2a4d847a0b0d458770de"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21935.json"}}],"schema_version":"1.7.5"}