Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-22008
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 Apr, 2025 | 08:17
Updated At-02 Jan, 2026 | 15:28
Rejected At-
▼CVE Numbering Authority (CNA)
regulator: check that dummy regulator has been probed before using it

In the Linux kernel, the following vulnerability has been resolved: regulator: check that dummy regulator has been probed before using it Due to asynchronous driver probing there is a chance that the dummy regulator hasn't already been probed when first accessing it.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/regulator/core.c
Default Status
unaffected
Versions
Affected
  • From 259b93b21a9ffe5117af4dfb5505437e463c6a5a before 998b1aae22dca87da392ea35f089406cbef6032d (git)
  • From 259b93b21a9ffe5117af4dfb5505437e463c6a5a before a99f1254b11eaadd0794b74a8178bad92ab01cae (git)
  • From 259b93b21a9ffe5117af4dfb5505437e463c6a5a before 21e3fdf3146f9c63888d6bfabbd553434a5fb93f (git)
  • From 259b93b21a9ffe5117af4dfb5505437e463c6a5a before 2c7a50bec4958f1d1c84d19cde518d0e96a676fd (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/regulator/core.c
Default Status
affected
Versions
Affected
  • 6.4
Unaffected
  • From 0 before 6.4 (semver)
  • From 6.6.85 through 6.6.* (semver)
  • From 6.12.21 through 6.12.* (semver)
  • From 6.13.9 through 6.13.* (semver)
  • From 6.14 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d
N/A
https://git.kernel.org/stable/c/a99f1254b11eaadd0794b74a8178bad92ab01cae
N/A
https://git.kernel.org/stable/c/21e3fdf3146f9c63888d6bfabbd553434a5fb93f
N/A
https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd
N/A
Hyperlink: https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a99f1254b11eaadd0794b74a8178bad92ab01cae
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/21e3fdf3146f9c63888d6bfabbd553434a5fb93f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Details not found