CVE-2025-22073 (GCVE-0-2025-22073)
Vulnerability from cvelistv5
Published
2025-04-16 14:12
Modified
2025-05-26 05:17
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: spufs: fix a leak on spufs_new_file() failure It's called from spufs_fill_dir(), and caller of that will do spufs_rmdir() in case of failure. That does remove everything we'd managed to create, but... the problem dentry is still negative. IOW, it needs to be explicitly dropped.
Impacted products
Vendor Product Version
Linux Linux Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Version: 3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "arch/powerpc/platforms/cell/spufs/inode.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b1eef06d10c1a9848e3a762919bbbe315a0a7cb4",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "132925bd6772d7614340fb755ac5415462ac8edd",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "53b189651c33b5f1fb3b755e6a37a8206978514e",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "96de7fbdc2dcadeebc17c3cb89e7cdab487bfce0",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "90d1b276d1b1379d20ad27d1f6349ba9f44a2e00",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "35f789ccebd69f6f9a1e0a9b85435003b2450065",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "d791985ceeb081155b4e96d314ca54c7605dcbe0",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "0bd56e4e72c354b65c0a7e5ac1c09eca81949d5b",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            },
            {
              "lessThan": "d1ca8698ca1332625d83ea0d753747be66f9906d",
              "status": "affected",
              "version": "3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "arch/powerpc/platforms/cell/spufs/inode.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.16"
            },
            {
              "lessThan": "2.6.16",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.292",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.236",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.180",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.134",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.87",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.23",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.292",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.236",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.180",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.134",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.87",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.23",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.11",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.2",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "2.6.16",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nspufs: fix a leak on spufs_new_file() failure\n\nIt\u0027s called from spufs_fill_dir(), and caller of that will do\nspufs_rmdir() in case of failure.  That does remove everything\nwe\u0027d managed to create, but... the problem dentry is still\nnegative.  IOW, it needs to be explicitly dropped."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-26T05:17:52.988Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b1eef06d10c1a9848e3a762919bbbe315a0a7cb4"
        },
        {
          "url": "https://git.kernel.org/stable/c/132925bd6772d7614340fb755ac5415462ac8edd"
        },
        {
          "url": "https://git.kernel.org/stable/c/53b189651c33b5f1fb3b755e6a37a8206978514e"
        },
        {
          "url": "https://git.kernel.org/stable/c/96de7fbdc2dcadeebc17c3cb89e7cdab487bfce0"
        },
        {
          "url": "https://git.kernel.org/stable/c/90d1b276d1b1379d20ad27d1f6349ba9f44a2e00"
        },
        {
          "url": "https://git.kernel.org/stable/c/35f789ccebd69f6f9a1e0a9b85435003b2450065"
        },
        {
          "url": "https://git.kernel.org/stable/c/d791985ceeb081155b4e96d314ca54c7605dcbe0"
        },
        {
          "url": "https://git.kernel.org/stable/c/0bd56e4e72c354b65c0a7e5ac1c09eca81949d5b"
        },
        {
          "url": "https://git.kernel.org/stable/c/d1ca8698ca1332625d83ea0d753747be66f9906d"
        }
      ],
      "title": "spufs: fix a leak on spufs_new_file() failure",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-22073",
    "datePublished": "2025-04-16T14:12:25.308Z",
    "dateReserved": "2024-12-29T08:45:45.814Z",
    "dateUpdated": "2025-05-26T05:17:52.988Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-22073\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-04-16T15:16:01.493\",\"lastModified\":\"2025-04-17T20:22:16.240\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nspufs: fix a leak on spufs_new_file() failure\\n\\nIt\u0027s called from spufs_fill_dir(), and caller of that will do\\nspufs_rmdir() in case of failure.  That does remove everything\\nwe\u0027d managed to create, but... the problem dentry is still\\nnegative.  IOW, it needs to be explicitly dropped.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spufs: se corrige una fuga en caso de fallo de spufs_new_file(). Se llama desde spufs_fill_dir(), y quien lo llama ejecutar\u00e1 spufs_rmdir() en caso de fallo. Esto elimina todo lo que hab\u00edamos creado, pero el problema de dentry sigue siendo negativo. Es decir, debe eliminarse expl\u00edcitamente.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0bd56e4e72c354b65c0a7e5ac1c09eca81949d5b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/132925bd6772d7614340fb755ac5415462ac8edd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/35f789ccebd69f6f9a1e0a9b85435003b2450065\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/53b189651c33b5f1fb3b755e6a37a8206978514e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/90d1b276d1b1379d20ad27d1f6349ba9f44a2e00\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/96de7fbdc2dcadeebc17c3cb89e7cdab487bfce0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b1eef06d10c1a9848e3a762919bbbe315a0a7cb4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d1ca8698ca1332625d83ea0d753747be66f9906d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d791985ceeb081155b4e96d314ca54c7605dcbe0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…