First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.12<5.15.180 | |
Linux Kernel | >=5.16<6.1.134 | |
Linux Kernel | >=6.2<6.6.87 | |
Linux Kernel | >=6.7<6.12.23 | |
Linux Kernel | >=6.13<6.13.11 | |
Linux Kernel | >=6.14<6.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-22097 is classified as moderate due to its nature of allowing potential memory corruption.
To fix CVE-2025-22097, upgrade to the latest stable version of the Linux kernel that includes the patched code.
CVE-2025-22097 affects various versions of the Linux kernel that implement the drm/vkms driver.
The risks associated with CVE-2025-22097 include potential system instability and exploitation that could lead to unauthorized access or denial of service.
Currently, there are no publicly recommended workarounds for CVE-2025-22097 other than updating to the patched kernel.