In the Linux kernel, the following vulnerability has been resolved:
PCI: brcmstb: Fix error path after a call to regulator_bulk_get()
If the regulator_bulk_get() returns an error and no regulators
are created, we need to set their number to zero.
If we don't do this and the PCIe link up fails, a call to the
regulator_bulk_free() will result in a kernel panic.
While at it, print the error value, as we cannot return an error
upwards as the kernel will WARN() on an error from add_bus().
[kwilczynski: commit log, use comma in the message to match style with
other similar messages]
References
Configurations
Configuration 1 (hide)
|
History
31 Oct 2025, 20:52
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/3651ad5249c51cf7eee078e12612557040a6bdb4 - Patch | |
| References | () https://git.kernel.org/stable/c/6f44e1fdb006db61394aa4d4c25728ada00842e7 - Patch | |
| References | () https://git.kernel.org/stable/c/7842e842a9bf6bd5866c84f588353711d131ab1a - Patch | |
| References | () https://git.kernel.org/stable/c/99a0efba9f903acbdece548862b6b4cbe7d999e1 - Patch | |
| References | () https://git.kernel.org/stable/c/df63321a40cc98e52313cffbff376b8ae9ceffa7 - Patch | |
| References | () https://git.kernel.org/stable/c/eedd054834930b8d678f0776cd4b091b8fffbb4a - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
16 Apr 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-16 15:16
Updated : 2025-10-31 20:52
NVD link : CVE-2025-22095
Mitre link : CVE-2025-22095
CVE.ORG link : CVE-2025-22095
JSON object : View
Products Affected
linux
- linux_kernel
CWE
