First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_cep_put(new_cep) being called, new_cep will be freed, and the following dereference will cause a UAF problem. Fix this issue.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=6.0<6.1.134 | |
Linux Kernel | >=6.2<6.6.87 | |
Linux Kernel | >=6.7<6.12.23 | |
Linux Kernel | >=6.13<6.13.11 | |
Linux Kernel | >=6.14<6.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22088 has been classified with a severity level that indicates the potential for a use-after-free vulnerability in the Linux kernel.
To fix CVE-2025-22088, update the Linux kernel to a version that includes the patch addressing this use-after-free issue.
CVE-2025-22088 affects certain versions of the Linux kernel prior to the application of the provided security patch.
CVE-2025-22088 impacts systems running vulnerable versions of the Linux kernel that utilize RDMA functionality.
The risks associated with CVE-2025-22088 include possible system crashes and exploitation through use-after-free vulnerabilities.