CVE-2025-22009

Source
https://cve.org/CVERecord?id=CVE-2025-22009
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22009.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-22009
Downstream
Related
Published
2025-04-08T08:17:59.840Z
Modified
2026-03-20T12:41:16.901883Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
regulator: dummy: force synchronous probing
Details

In the Linux kernel, the following vulnerability has been resolved:

regulator: dummy: force synchronous probing

Sometimes I get a NULL pointer dereference at boot time in kobject_get() with the following call stack:

anatopregulatorprobe() devmregulatorregister() regulatorregister() regulatorresolvesupply() kobjectget()

By placing some extra BUGON() statements I could verify that this is raised because probing of the 'dummy' regulator driver is not completed ('dummyregulator_rdev' is still NULL).

In the JTAG debugger I can see that dummyregulatorprobe() and anatopregulatorprobe() can be run by different kernel threads (kworker/u4:*). I haven't further investigated whether this can be changed or if there are other possibilities to force synchronization between these two probe routines. On the other hand I don't expect much boot time penalty by probing the 'dummy' regulator synchronously.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22009.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
259b93b21a9ffe5117af4dfb5505437e463c6a5a
Fixed
e26f24ca4fb940b15e092796c5993142a2558bd9
Fixed
d3b83a1442a09b145006eb4294b1a963c5345c9c
Fixed
5ade367b56c3947c990598df92395ce737bee872
Fixed
8619909b38eeebd3e60910158d7d68441fc954e9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22009.json"