{"id":"CVE-2025-22097","summary":"drm/vkms: Fix use after free and double free on init error","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vkms: Fix use after free and double free on init error\n\nIf the driver initialization fails, the vkms_exit() function might\naccess an uninitialized or freed default_config pointer and it might\ndouble free it.\n\nFix both possible errors by initializing default_config only when the\ndriver initialization succeeded.","modified":"2026-04-16T04:30:42.965443471Z","published":"2025-04-16T14:12:47.649Z","related":["ALSA-2025:13960","ALSA-2025:13961","ALSA-2025:15447","ALSA-2025:15661","SUSE-SU-2025:01614-1","SUSE-SU-2025:01620-1","SUSE-SU-2025:01627-1","SUSE-SU-2025:01640-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:01972-1","SUSE-SU-2025:1573-1","SUSE-SU-2025:20343-1","SUSE-SU-2025:20344-1","SUSE-SU-2025:20354-1","SUSE-SU-2025:20355-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22097.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49a69f67f53518bdd9b7eeebf019a2da6cc0e954"},{"type":"WEB","url":"https://git.kernel.org/stable/c/561fc0c5cf41f646f3e9e61784cbc0fc832fb936"},{"type":"WEB","url":"https://git.kernel.org/stable/c/79d138d137b80eeb0a83244d1cff29e64cf91067"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8a18bb53e06d6d3c1fd03d12533d6e333ba8853"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d5eb8e347905ab17788a7903fa1d3d06747355f5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed15511a773df86205bda66c37193569575ae828"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22097.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22097"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2df7af93fdadb9ba8226fe443fae15ecdefda2a6"},{"fixed":"49a69f67f53518bdd9b7eeebf019a2da6cc0e954"},{"fixed":"79d138d137b80eeb0a83244d1cff29e64cf91067"},{"fixed":"561fc0c5cf41f646f3e9e61784cbc0fc832fb936"},{"fixed":"d5eb8e347905ab17788a7903fa1d3d06747355f5"},{"fixed":"b8a18bb53e06d6d3c1fd03d12533d6e333ba8853"},{"fixed":"1f68f1cf09d06061eb549726ff8339e064eddebd"},{"fixed":"ed15511a773df86205bda66c37193569575ae828"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22097.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}