Use After Free and Double Free Vulnerability in Linux Kernel VKMS Driver
CVE-2025-22097
Summary
A vulnerability in the VKMS driver of the Linux kernel can lead to potential security risks during driver initialization failures. When the vkms_exit() function is invoked due to initialization errors, it may access an uninitialized or already freed default_config pointer, possibly resulting in a double free scenario. This issue has been addressed by ensuring that default_config is only initialized if the driver initialization completes successfully, thus mitigating the risks associated with accessing invalid memory.
Affected Version(s)
Linux 2df7af93fdadb9ba8226fe443fae15ecdefda2a6 < 49a69f67f53518bdd9b7eeebf019a2da6cc0e954
Linux 2df7af93fdadb9ba8226fe443fae15ecdefda2a6 < 79d138d137b80eeb0a83244d1cff29e64cf91067
Linux 2df7af93fdadb9ba8226fe443fae15ecdefda2a6 < 561fc0c5cf41f646f3e9e61784cbc0fc832fb936
References
CVSS V3.1
Timeline
Vulnerability published