#VU106956 Use-after-free in Linux kernel - CVE-2025-22004


| Updated: 2025-05-11

Vulnerability identifier: #VU106956

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22004

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the lec_send() function in net/atm/lec.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 6.13, 6.13.1, 6.13.2, 6.13.3, 6.13.4, 6.13.5, 6.13.6, 6.13.7, 6.13.8


External links
https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb
https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c
https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730
https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3
https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.9


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability