Use After Free and Double Free Vulnerability in Linux Kernel VKMS Driver
CVE-2025-22097

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
16 April 2025

Summary

A vulnerability in the VKMS driver of the Linux kernel can lead to potential security risks during driver initialization failures. When the vkms_exit() function is invoked due to initialization errors, it may access an uninitialized or already freed default_config pointer, possibly resulting in a double free scenario. This issue has been addressed by ensuring that default_config is only initialized if the driver initialization completes successfully, thus mitigating the risks associated with accessing invalid memory.

Affected Version(s)

Linux 2df7af93fdadb9ba8226fe443fae15ecdefda2a6 < 49a69f67f53518bdd9b7eeebf019a2da6cc0e954

Linux 2df7af93fdadb9ba8226fe443fae15ecdefda2a6 < 79d138d137b80eeb0a83244d1cff29e64cf91067

Linux 2df7af93fdadb9ba8226fe443fae15ecdefda2a6 < 561fc0c5cf41f646f3e9e61784cbc0fc832fb936

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.