{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-22073","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-29T08:45:45.814Z","datePublished":"2025-04-16T14:12:25.308Z","dateUpdated":"2026-05-11T21:12:07.962Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:12:07.962Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nspufs: fix a leak on spufs_new_file() failure\n\nIt's called from spufs_fill_dir(), and caller of that will do\nspufs_rmdir() in case of failure.  That does remove everything\nwe'd managed to create, but... the problem dentry is still\nnegative.  IOW, it needs to be explicitly dropped."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/powerpc/platforms/cell/spufs/inode.c"],"versions":[{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"b1eef06d10c1a9848e3a762919bbbe315a0a7cb4","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"132925bd6772d7614340fb755ac5415462ac8edd","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"53b189651c33b5f1fb3b755e6a37a8206978514e","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"96de7fbdc2dcadeebc17c3cb89e7cdab487bfce0","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"90d1b276d1b1379d20ad27d1f6349ba9f44a2e00","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"35f789ccebd69f6f9a1e0a9b85435003b2450065","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"d791985ceeb081155b4e96d314ca54c7605dcbe0","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"0bd56e4e72c354b65c0a7e5ac1c09eca81949d5b","status":"affected","versionType":"git"},{"version":"3f51dd91c80746a5cf76f8c4a77bfc88aa82bb9e","lessThan":"d1ca8698ca1332625d83ea0d753747be66f9906d","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/powerpc/platforms/cell/spufs/inode.c"],"versions":[{"version":"2.6.16","status":"affected"},{"version":"0","lessThan":"2.6.16","status":"unaffected","versionType":"semver"},{"version":"5.4.292","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.236","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.180","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.134","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.87","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.23","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.11","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14.2","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.4.292"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.10.236"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"5.15.180"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"6.1.134"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"6.6.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"6.12.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"6.13.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"6.14.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.16","versionEndExcluding":"6.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b1eef06d10c1a9848e3a762919bbbe315a0a7cb4"},{"url":"https://git.kernel.org/stable/c/132925bd6772d7614340fb755ac5415462ac8edd"},{"url":"https://git.kernel.org/stable/c/53b189651c33b5f1fb3b755e6a37a8206978514e"},{"url":"https://git.kernel.org/stable/c/96de7fbdc2dcadeebc17c3cb89e7cdab487bfce0"},{"url":"https://git.kernel.org/stable/c/90d1b276d1b1379d20ad27d1f6349ba9f44a2e00"},{"url":"https://git.kernel.org/stable/c/35f789ccebd69f6f9a1e0a9b85435003b2450065"},{"url":"https://git.kernel.org/stable/c/d791985ceeb081155b4e96d314ca54c7605dcbe0"},{"url":"https://git.kernel.org/stable/c/0bd56e4e72c354b65c0a7e5ac1c09eca81949d5b"},{"url":"https://git.kernel.org/stable/c/d1ca8698ca1332625d83ea0d753747be66f9906d"}],"title":"spufs: fix a leak on spufs_new_file() failure","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:41:53.661Z"}}]}}