First published: Thu Apr 03 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22004 has a medium severity rating due to the potential for a use after free vulnerability in the Linux kernel.
To fix CVE-2025-22004, update the Linux kernel to the latest patched version where the issue has been resolved.
CVE-2025-22004 affects specific versions of the Linux kernel that contain the flaw in the atm subsystem.
Systems running vulnerable versions of the Linux kernel that utilize the ATM subsystem are at risk due to CVE-2025-22004.
As of now, there are no known active exploits specifically targeting CVE-2025-22004, but it is advisable to apply updates promptly.