Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: regulator: dummy: force synchronous probing Sometimes I get a NULL pointer dereference at boot time in kobject_get() with the following call stack: anatop_regulator_probe() devm_regulator_register() regulator_register() regulator_resolve_supply() kobject_get() By placing some extra BUG_ON() statements I could verify that this is raised because probing of the 'dummy' regulator driver is not completed ('dummy_regulator_rdev' is still NULL). In the JTAG debugger I can see that dummy_regulator_probe() and anatop_regulator_probe() can be run by different kernel threads (kworker/u4:*). I haven't further investigated whether this can be changed or if there are other possibilities to force synchronization between these two probe routines. On the other hand I don't expect much boot time penalty by probing the 'dummy' regulator synchronously.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.4, < 6.6.85 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/5ade367b56c3947c990598df92395ce737bee872Patch
- https://git.kernel.org/stable/c/8619909b38eeebd3e60910158d7d68441fc954e9Patch
- https://git.kernel.org/stable/c/d3b83a1442a09b145006eb4294b1a963c5345c9cPatch
- https://git.kernel.org/stable/c/e26f24ca4fb940b15e092796c5993142a2558bd9Patch
FAQ
What is CVE-2025-22009?
CVE-2025-22009 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: regulator: dummy: force synchronous probing Sometimes I get a NULL pointer dereference at boot time in kobject_get() with the foll...
How severe is CVE-2025-22009?
CVE-2025-22009 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-22009?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.