Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.12, < 6.1.132 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fbPatch
- https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e
- https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30cPatch
- https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6
- https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7
- https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730Patch
- https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3Patch
- https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762Patch
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
FAQ
What is CVE-2025-22004?
CVE-2025-22004 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a ...
How severe is CVE-2025-22004?
CVE-2025-22004 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-22004?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.