{"uuid": "bfa35180-cc79-42ce-8414-0f0827758437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22004", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10179", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22004\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: fix use after free in lec_send()\n\nThe -&gt;send() operation frees skb so save the length before calling\n-&gt;send() to avoid a use after free.\n\ud83d\udccf Published: 2025-04-03T07:19:06.022Z\n\ud83d\udccf Modified: 2025-04-03T07:19:06.022Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c\n2. https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730\n3. https://git.kernel.org/stable/c/326223182e4703cde99fdbd36d07d0b3de9980fb\n4. https://git.kernel.org/stable/c/f3271f7548385e0096739965961c7cbf7e6b4762\n5. https://git.kernel.org/stable/c/f3009d0d6ab78053117f8857b921a8237f4d17b3", "creation_timestamp": "2025-04-03T07:34:10.000000Z"}