Bug 2360293 (CVE-2025-22095) - CVE-2025-22095 kernel: PCI: brcmstb: Fix error path after a call to regulator_bulk_get()
Summary: CVE-2025-22095 kernel: PCI: brcmstb: Fix error path after a call to regulator...
Keywords:
Status: NEW
Alias: CVE-2025-22095
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-16 15:06 UTC by OSIDB Bzimport
Modified: 2025-04-17 09:29 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-04-16 15:06:45 UTC
In the Linux kernel, the following vulnerability has been resolved:

PCI: brcmstb: Fix error path after a call to regulator_bulk_get()

If the regulator_bulk_get() returns an error and no regulators
are created, we need to set their number to zero.

If we don't do this and the PCIe link up fails, a call to the
regulator_bulk_free() will result in a kernel panic.

While at it, print the error value, as we cannot return an error
upwards as the kernel will WARN() on an error from add_bus().

[kwilczynski: commit log, use comma in the message to match style with
other similar messages]

Comment 1 Avinash Hanwate 2025-04-17 06:03:17 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025041619-CVE-2025-22095-7f29@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.