CVE-2025-22095

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-22095
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-22095.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-22095
Downstream
Related
Published
2025-04-16T14:12:46.226Z
Modified
2025-11-28T02:33:49.577738Z
Summary
PCI: brcmstb: Fix error path after a call to regulator_bulk_get()
Details

In the Linux kernel, the following vulnerability has been resolved:

PCI: brcmstb: Fix error path after a call to regulatorbulkget()

If the regulatorbulkget() returns an error and no regulators are created, we need to set their number to zero.

If we don't do this and the PCIe link up fails, a call to the regulatorbulkfree() will result in a kernel panic.

While at it, print the error value, as we cannot return an error upwards as the kernel will WARN() on an error from add_bus().

[kwilczynski: commit log, use comma in the message to match style with other similar messages]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22095.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9e6be018b26347c26a93e63fb50a37ee2c9311de
Fixed
99a0efba9f903acbdece548862b6b4cbe7d999e1
Fixed
eedd054834930b8d678f0776cd4b091b8fffbb4a
Fixed
df63321a40cc98e52313cffbff376b8ae9ceffa7
Fixed
7842e842a9bf6bd5866c84f588353711d131ab1a
Fixed
6f44e1fdb006db61394aa4d4c25728ada00842e7
Fixed
3651ad5249c51cf7eee078e12612557040a6bdb4

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.1.134
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.87
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.23
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.11
Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.14.2