CVE-2025-22004

In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*

History

10 Apr 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e -
  • () https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6 -
  • () https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7 -

08 Apr 2025, 15:48

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb - () https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb - Patch
References () https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c - () https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c - Patch
References () https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730 - () https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730 - Patch
References () https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3 - () https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3 - Patch
References () https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762 - () https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762 - Patch

03 Apr 2025, 16:15

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: atm: se corrige el use after free en lec_send() La operación ->send() libera skb, así que guarde la longitud antes de llamar a ->send() para evitar un use after free.

03 Apr 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-03 08:15

Updated : 2025-04-10 13:15


NVD link : CVE-2025-22004

Mitre link : CVE-2025-22004

CVE.ORG link : CVE-2025-22004


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free