CVE-2025-22095

In the Linux kernel, the following vulnerability has been resolved: PCI: brcmstb: Fix error path after a call to regulator_bulk_get() If the regulator_bulk_get() returns an error and no regulators are created, we need to set their number to zero. If we don't do this and the PCIe link up fails, a call to the regulator_bulk_free() will result in a kernel panic. While at it, print the error value, as we cannot return an error upwards as the kernel will WARN() on an error from add_bus(). [kwilczynski: commit log, use comma in the message to match style with other similar messages]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Oct 2025, 20:52

Type Values Removed Values Added
CWE NVD-CWE-noinfo
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: brcmstb: Corrección de la ruta de error tras una llamada a regulator_bulk_get(). Si regulator_bulk_get() devuelve un error y no se crean reguladores, debemos establecer su número en cero. Si no lo hacemos y falla la conexión PCIe, una llamada a regulator_bulk_free() provocará un pánico del kernel. Mientras tanto, imprima el valor del error, ya que no podemos devolver un error hacia arriba, ya que el kernel emitirá una advertencia WARN() en caso de un error de add_bus(). [kwilczynski: registro de confirmaciones, usar coma en el mensaje para que coincida con el estilo de otros mensajes similares]
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/3651ad5249c51cf7eee078e12612557040a6bdb4 - () https://git.kernel.org/stable/c/3651ad5249c51cf7eee078e12612557040a6bdb4 - Patch
References () https://git.kernel.org/stable/c/6f44e1fdb006db61394aa4d4c25728ada00842e7 - () https://git.kernel.org/stable/c/6f44e1fdb006db61394aa4d4c25728ada00842e7 - Patch
References () https://git.kernel.org/stable/c/7842e842a9bf6bd5866c84f588353711d131ab1a - () https://git.kernel.org/stable/c/7842e842a9bf6bd5866c84f588353711d131ab1a - Patch
References () https://git.kernel.org/stable/c/99a0efba9f903acbdece548862b6b4cbe7d999e1 - () https://git.kernel.org/stable/c/99a0efba9f903acbdece548862b6b4cbe7d999e1 - Patch
References () https://git.kernel.org/stable/c/df63321a40cc98e52313cffbff376b8ae9ceffa7 - () https://git.kernel.org/stable/c/df63321a40cc98e52313cffbff376b8ae9ceffa7 - Patch
References () https://git.kernel.org/stable/c/eedd054834930b8d678f0776cd4b091b8fffbb4a - () https://git.kernel.org/stable/c/eedd054834930b8d678f0776cd4b091b8fffbb4a - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

16 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:16

Updated : 2025-10-31 20:52


NVD link : CVE-2025-22095

Mitre link : CVE-2025-22095

CVE.ORG link : CVE-2025-22095


JSON object : View

Products Affected

linux

  • linux_kernel