U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-22004 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb kernel.org Patch 
https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e kernel.org
https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c kernel.org Patch 
https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6 kernel.org
https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7 kernel.org
https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730 kernel.org Patch 
https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3 kernel.org Patch 
https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762 kernel.org Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-416 Use After Free CISA-ADP  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

4 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-22004
NVD Published Date:
04/03/2025
NVD Last Modified:
04/10/2025
Source:
kernel.org