In the Linux kernel, the following vulnerability has been resolved:
net: atm: fix use after free in lec_send()
The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22004.json"
}[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2025-22004-1634171d",
"target": {
"file": "net/atm/lec.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"140982194473456284655577955072550493681",
"296513112958239514169726885400059035930",
"91998384793590248680894217801242958121",
"101231030639658463570172148195867519771",
"114424877148071169618273184066674632442",
"192886805943921531511388394377978637335",
"172351513566906174766989801418389359665",
"6162495171633433451390152712398448676"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@50e288097c2c6e5f374ae079394436fc29d1e88e"
},
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-22004-7ae079cc",
"target": {
"file": "net/atm/lec.c",
"function": "lec_send"
},
"digest": {
"length": 315.0,
"function_hash": "208595964455572661627568011449158528745"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@50e288097c2c6e5f374ae079394436fc29d1e88e"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22004.json"