CVE-2025-22095
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/04/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PCI: brcmstb: Fix error path after a call to regulator_bulk_get()<br />
<br />
If the regulator_bulk_get() returns an error and no regulators<br />
are created, we need to set their number to zero.<br />
<br />
If we don&#39;t do this and the PCIe link up fails, a call to the<br />
regulator_bulk_free() will result in a kernel panic.<br />
<br />
While at it, print the error value, as we cannot return an error<br />
upwards as the kernel will WARN() on an error from add_bus().<br />
<br />
[kwilczynski: commit log, use comma in the message to match style with<br />
other similar messages]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.87 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3651ad5249c51cf7eee078e12612557040a6bdb4
- https://git.kernel.org/stable/c/6f44e1fdb006db61394aa4d4c25728ada00842e7
- https://git.kernel.org/stable/c/7842e842a9bf6bd5866c84f588353711d131ab1a
- https://git.kernel.org/stable/c/99a0efba9f903acbdece548862b6b4cbe7d999e1
- https://git.kernel.org/stable/c/df63321a40cc98e52313cffbff376b8ae9ceffa7
- https://git.kernel.org/stable/c/eedd054834930b8d678f0776cd4b091b8fffbb4a
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



