CVE-2025-22097Use After Free in Linux

CWE-416Use After Free65 documents7 sources
Severity
7.8HIGHNVD
OSV8.8OSV7.1OSV5.9OSV5.5OSV4.4
EPSS
0.1%
top 78.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16
Latest updateJan 9

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vkms: Fix use after free and double free on init error If the driver initialization fails, the vkms_exit() function might access an uninitialized or freed default_config pointer and it might double free it. Fix both possible errors by initializing default_config only when the driver initialization succeeded.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages9 packages

NVDlinux/linux_kernel5.125.15.180+5
Debianlinux/linux_kernel< 6.1.135-1+2
Ubuntulinux/linux_kernel< 5.15.0-142.152+2
CVEListV5linux/linux2df7af93fdadb9ba8226fe443fae15ecdefda2a649a69f67f53518bdd9b7eeebf019a2da6cc0e954+7

Patches

🔴Vulnerability Details

32
OSV
linux-azure-nvidia vulnerabilities2026-01-09
OSV
linux-azure-fips vulnerabilities2025-12-17
OSV
linux-raspi vulnerabilities2025-11-25
OSV
linux-raspi-realtime vulnerabilities2025-11-24
OSV
linux-aws-6.8 vulnerabilities2025-11-12

📋Vendor Advisories

32
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2026-01-09
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-12-17
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-11-25
Ubuntu
Linux kernel (Raspberry Pi Real-time) vulnerabilities2025-11-24
Ubuntu
Linux kernel (AWS) vulnerabilities2025-11-12
CVE-2025-22097 — Use After Free in Linux | cvebase