CVE-2025-22095
Published: April 18, 2025Last modified: April 18, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: PCI: brcmstb: Fix error path after a call to regulator_bulk_get() If the regulator_bulk_get() returns an error and no regulators are created, we need to set their number to zero. If we don't do this and the PCIe link up fails, a call to the regulator_bulk_free() will result in a kernel panic. While at it, print the error value, as we cannot return an error upwards as the kernel will WARN() on an error from add_bus(). [kwilczynski: commit log, use comma in the message to match style with other similar messages]
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.5 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.134-r0) |
| 25 LTS | linux-lts | Fixed (6.12.41-r0) | |
| Stream | linux-lts | Fixed (6.12.41-r0) |
References
- https://git.kernel.org/stable/c/3651ad5249c51cf7eee078e12612557040a6bdb4
- https://git.kernel.org/stable/c/6f44e1fdb006db61394aa4d4c25728ada00842e7
- https://git.kernel.org/stable/c/7842e842a9bf6bd5866c84f588353711d131ab1a
- https://git.kernel.org/stable/c/99a0efba9f903acbdece548862b6b4cbe7d999e1
- https://git.kernel.org/stable/c/df63321a40cc98e52313cffbff376b8ae9ceffa7
- https://git.kernel.org/stable/c/eedd054834930b8d678f0776cd4b091b8fffbb4a
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html