{"id":"CVE-2025-22095","summary":"PCI: brcmstb: Fix error path after a call to regulator_bulk_get()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: brcmstb: Fix error path after a call to regulator_bulk_get()\n\nIf the regulator_bulk_get() returns an error and no regulators\nare created, we need to set their number to zero.\n\nIf we don't do this and the PCIe link up fails, a call to the\nregulator_bulk_free() will result in a kernel panic.\n\nWhile at it, print the error value, as we cannot return an error\nupwards as the kernel will WARN() on an error from add_bus().\n\n[kwilczynski: commit log, use comma in the message to match style with\nother similar messages]","modified":"2026-04-16T04:38:57.006042281Z","published":"2025-04-16T14:12:46.226Z","related":["SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22095.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3651ad5249c51cf7eee078e12612557040a6bdb4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f44e1fdb006db61394aa4d4c25728ada00842e7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7842e842a9bf6bd5866c84f588353711d131ab1a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/99a0efba9f903acbdece548862b6b4cbe7d999e1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df63321a40cc98e52313cffbff376b8ae9ceffa7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eedd054834930b8d678f0776cd4b091b8fffbb4a"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22095.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22095"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9e6be018b26347c26a93e63fb50a37ee2c9311de"},{"fixed":"99a0efba9f903acbdece548862b6b4cbe7d999e1"},{"fixed":"eedd054834930b8d678f0776cd4b091b8fffbb4a"},{"fixed":"df63321a40cc98e52313cffbff376b8ae9ceffa7"},{"fixed":"7842e842a9bf6bd5866c84f588353711d131ab1a"},{"fixed":"6f44e1fdb006db61394aa4d4c25728ada00842e7"},{"fixed":"3651ad5249c51cf7eee078e12612557040a6bdb4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22095.json"}}],"schema_version":"1.7.5"}