
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap overflow vulnerability was discovered in the Linux kernel's RapidIO communication manager (drivers/rapidio/rio_cm.c). The vulnerability was disclosed on June 30, 2025, and affects the Linux kernel's RapidIO subsystem (NVD).
The vulnerability exists in the riocmcdevioctl(RIOCMCHANSEND) function chain, specifically in the cmchanmsgsend() and riocmchsend() functions. While cmchanmsgsend() implements checks to prevent excessive data from userspace, riocmchsend() failed to verify if sufficient data was provided. This oversight allows writing to fields in the riochchanhdr beyond the allocated space (NVD, Debian Tracker).
The vulnerability could lead to a heap overflow condition, potentially allowing an attacker to write beyond the bounds of allocated memory space. This could result in memory corruption and potentially lead to privilege escalation or system crashes (NVD).
The issue has been addressed by implementing additional checks in riocmchsend() to verify that the entire riochchan_hdr was properly copied from userspace. Multiple Linux distributions have released or are preparing updates to address this vulnerability (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."