
Cloud Vulnerability DB
A community-led vulnerabilities database
A stack protector issue was discovered in the Linux kernel's KVM implementation for LoongArch architecture, specifically in the sendipidata() function. The vulnerability was disclosed on September 5, 2025, and affects the buffer handling in the kvmiobus_read() function (NVD).
The vulnerability occurs when kvmiobusread() is called in the sendipidata() function, where the buffer size of parameter *val should be at least 8 bytes. The issue arises because emulation functions like loongarchipireadl() and kvmeiointcread() write the buffer *val with 8 bytes signed extension regardless of the parameter length, leading to a buffer overflow when CONFIGSTACKPROTECTOR is enabled (NVD).
When exploited, this vulnerability results in a kernel panic with stack corruption, as evidenced by the error message: "stack-protector: Kernel stack is corrupted in: sendipidata+0x194/0x1a0 [kvm]" (NVD).
The issue has been resolved in the Linux kernel through patches that address the buffer size handling in the sendipidata() function (Kernel.org).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."