In the Linux kernel, the following vulnerability has been resolved:
regulator: core: fix use_count leakage when handling boot-on
I found a use_count leakage towards supply regulator of rdev with
boot-on option.
┌───────────────────┐ ┌───────────────────┐
│ regulator_dev A │ │ regulator_dev B │
│ (boot-on) │ │ (boot-on) │
│ use_count=0 │◀──supply──│ use_count=1 │
│ │ │ │
└───────────────────┘ └───────────────────┘
In case of rdev(A) configured with `regulator-boot-on', the use_count
of supplying regulator(B) will increment inside
regulator_enable(rdev->supply).
Thus, B will acts like always-on, and further balanced
regulator_enable/disable cannot actually disable it anymore.
However, B was also configured with `regulator-boot-on', we wish it
could be disabled afterwards.
References
Configurations
Configuration 1 (hide)
|
History
25 Nov 2025, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-Other | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/0591b14ce0398125439c759f889647369aa616a0 - Patch | |
| References | () https://git.kernel.org/stable/c/4b737246ff50f810d6ab4be13c1388a07f0c14b1 - Patch | |
| References | () https://git.kernel.org/stable/c/4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347 - Patch | |
| References | () https://git.kernel.org/stable/c/5bfc53df288e8ea54ca6866fb92034214940183f - Patch | |
| References | () https://git.kernel.org/stable/c/bc6c381df5793ebcf32db88a3e65acf7870379fc - Patch | |
| References | () https://git.kernel.org/stable/c/dc3391d49479bc2bf8a2b88dbf86fdd800882fee - Patch | |
| References | () https://git.kernel.org/stable/c/feb847e6591e8c7a09cc39721cc9ca74fd9a5d80 - Patch |
15 Sep 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-15 14:15
Updated : 2025-11-25 14:40
NVD link : CVE-2022-50250
Mitre link : CVE-2022-50250
CVE.ORG link : CVE-2022-50250
JSON object : View
Products Affected
linux
- linux_kernel
CWE
