CVE-2025-22088
Published: April 18, 2025Last modified: April 18, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_cep_put(new_cep) being called, new_cep will be freed, and the following dereference will cause a UAF problem. Fix this issue.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 7.8 | 
| Attack Vector | LOCAL | 
| Attack complexity | LOW | 
| Privileges required | LOW | 
| User interaction | NONE | 
| Scope | UNCHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.134-r0) | 
| 25 LTS | linux-lts | Fixed (6.12.41-r0) | |
| Stream | linux-lts | Fixed (6.12.41-r0) | 
References
- https://git.kernel.org/stable/c/667a628ab67d359166799fad89b3c6909599558a
- https://git.kernel.org/stable/c/78411a133312ce7d8a3239c76a8fd85bca1cc10f
- https://git.kernel.org/stable/c/7aa6bb5276d9fec98deb05615a086eeb893854ad
- https://git.kernel.org/stable/c/83437689249e6a17b25e27712fbee292e42e7855
- https://git.kernel.org/stable/c/a114d25d584c14019d31dbf2163780c47415a187
- https://git.kernel.org/stable/c/bc1db4d8f1b0dc480d7d745a60a8cc94ce2badd4