-

CVE-2025-68354

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex

regulator_supply_alias_list was accessed without any locking in
regulator_supply_alias(), regulator_register_supply_alias(), and
regulator_unregister_supply_alias(). Concurrent registration,
unregistration and lookups can race, leading to:

1 use-after-free if an alias entry is removed while being read,
2 duplicate entries when two threads register the same alias,
3 inconsistent alias mappings observed by consumers.

Protect all traversals, insertions and deletions on
regulator_supply_alias_list with the existing regulator_list_mutex.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < e1587064137028e7edcca14fb766b68d27bec94b
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
Version < 9d041a7ba13f21adfac052eb3fda1df62f2166c1
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
Version < a63fbc07d1b34a9821ea3b31ff4e6456f9d0aa61
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
Version < 09811a83b214cc15521e0d818e43ae9043e9a28d
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
Version < a9864d42ebcdd394ebb864643b961b36e7b515be
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
Version < 431a1d44ad4866362cc28fc1cc4ca93d84989239
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
Version < 64099b5c0aeb70bc7cd5556eb7f59c5b4a5010bf
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
Version < 0cc15a10c3b4ab14cd71b779fd5c9ca0cb2bc30d
Version a06ccd9c3785fa5550917ae036944f4e080b5749
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.13
Status affected
Version < 3.13
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.63
Status unaffected
Version <= 6.17.*
Version 6.17.13
Status unaffected
Version <= 6.18.*
Version 6.18.2
Status unaffected
Version <= *
Version 6.19-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.