CVE-2025-22071

In the Linux kernel, the following vulnerability has been resolved: spufs: fix a leak in spufs_create_context() Leak fixes back in 2008 missed one case - if we are trying to set affinity and spufs_mkdir() fails, we need to drop the reference to neighbor.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Oct 2025, 20:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spufs: corrige una fuga en spufs_create_context() Las correcciones de fugas en 2008 pasaron por alto un caso: si estamos tratando de establecer la afinidad y spufs_mkdir() falla, debemos eliminar la referencia al vecino.
References () https://git.kernel.org/stable/c/0f5cce3fc55b08ee4da3372baccf4bcd36a98396 - () https://git.kernel.org/stable/c/0f5cce3fc55b08ee4da3372baccf4bcd36a98396 - Patch
References () https://git.kernel.org/stable/c/239ea3c34673b3244a499fd65771c47e5bffcbb0 - () https://git.kernel.org/stable/c/239ea3c34673b3244a499fd65771c47e5bffcbb0 - Patch
References () https://git.kernel.org/stable/c/410c787d89c92df4215d7b1a338e2c1a8aba6b9b - () https://git.kernel.org/stable/c/410c787d89c92df4215d7b1a338e2c1a8aba6b9b - Patch
References () https://git.kernel.org/stable/c/4a7448c83e117ed68597952ecaede1cebc4427a7 - () https://git.kernel.org/stable/c/4a7448c83e117ed68597952ecaede1cebc4427a7 - Patch
References () https://git.kernel.org/stable/c/5a90b699844a5bb96961e5892e51cc59255444a3 - () https://git.kernel.org/stable/c/5a90b699844a5bb96961e5892e51cc59255444a3 - Patch
References () https://git.kernel.org/stable/c/829bd6139968e2e759f3928cf65ad0db1e302fe3 - () https://git.kernel.org/stable/c/829bd6139968e2e759f3928cf65ad0db1e302fe3 - Patch
References () https://git.kernel.org/stable/c/a333f223e555d27609f8b45d75a08e8e1d36c432 - () https://git.kernel.org/stable/c/a333f223e555d27609f8b45d75a08e8e1d36c432 - Patch
References () https://git.kernel.org/stable/c/c4e72a0d75442237b6f3bcca10a7d81b89376d16 - () https://git.kernel.org/stable/c/c4e72a0d75442237b6f3bcca10a7d81b89376d16 - Patch
References () https://git.kernel.org/stable/c/d04600f43569d48262e1328eaa1592fcefa2c19c - () https://git.kernel.org/stable/c/d04600f43569d48262e1328eaa1592fcefa2c19c - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401

16 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:16

Updated : 2025-10-31 20:43


NVD link : CVE-2025-22071

Mitre link : CVE-2025-22071

CVE.ORG link : CVE-2025-22071


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime