CVE-2025-22008

In the Linux kernel, the following vulnerability has been resolved: regulator: check that dummy regulator has been probed before using it Due to asynchronous driver probing there is a chance that the dummy regulator hasn't already been probed when first accessing it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*

History

28 Oct 2025, 17:17

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/21e3fdf3146f9c63888d6bfabbd553434a5fb93f - () https://git.kernel.org/stable/c/21e3fdf3146f9c63888d6bfabbd553434a5fb93f - Patch
References () https://git.kernel.org/stable/c/270fe5c090f62dfce1cad0f5053e4827a6f50df4 - () https://git.kernel.org/stable/c/270fe5c090f62dfce1cad0f5053e4827a6f50df4 - Patch
References () https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd - () https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd - Patch
References () https://git.kernel.org/stable/c/3a9c46af5654783f99015727ac65bc2a23e2735a - () https://git.kernel.org/stable/c/3a9c46af5654783f99015727ac65bc2a23e2735a - Patch
References () https://git.kernel.org/stable/c/8e500180904aae63afdce95cb378aeabe119ecda - () https://git.kernel.org/stable/c/8e500180904aae63afdce95cb378aeabe119ecda - Patch
References () https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d - () https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d - Patch
References () https://git.kernel.org/stable/c/a99f1254b11eaadd0794b74a8178bad92ab01cae - () https://git.kernel.org/stable/c/a99f1254b11eaadd0794b74a8178bad92ab01cae - Patch

10 Apr 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3a9c46af5654783f99015727ac65bc2a23e2735a -
  • () https://git.kernel.org/stable/c/8e500180904aae63afdce95cb378aeabe119ecda -

08 Apr 2025, 18:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: regulador: comprobar que el regulador ficticio haya sido probado antes de usarlo Debido al sondeo asincrónico del controlador existe la posibilidad de que el regulador ficticio no haya sido probado ya cuando se accede a él por primera vez.

08 Apr 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-08 09:15

Updated : 2025-10-28 17:17


NVD link : CVE-2025-22008

Mitre link : CVE-2025-22008

CVE.ORG link : CVE-2025-22008


JSON object : View

Products Affected

linux

  • linux_kernel