CVE-2025-22097
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
16/04/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/vkms: Fix use after free and double free on init error<br />
<br />
If the driver initialization fails, the vkms_exit() function might<br />
access an uninitialized or freed default_config pointer and it might<br />
double free it.<br />
<br />
Fix both possible errors by initializing default_config only when the<br />
driver initialization succeeded.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.15.180 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.87 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd
- https://git.kernel.org/stable/c/49a69f67f53518bdd9b7eeebf019a2da6cc0e954
- https://git.kernel.org/stable/c/561fc0c5cf41f646f3e9e61784cbc0fc832fb936
- https://git.kernel.org/stable/c/79d138d137b80eeb0a83244d1cff29e64cf91067
- https://git.kernel.org/stable/c/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853
- https://git.kernel.org/stable/c/d5eb8e347905ab17788a7903fa1d3d06747355f5
- https://git.kernel.org/stable/c/ed15511a773df86205bda66c37193569575ae828
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



