CVE-2022-50250

In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix use_count leakage when handling boot-on I found a use_count leakage towards supply regulator of rdev with boot-on option. ┌───────────────────┐ ┌───────────────────┐ │ regulator_dev A │ │ regulator_dev B │ │ (boot-on) │ │ (boot-on) │ │ use_count=0 │◀──supply──│ use_count=1 │ │ │ │ │ └───────────────────┘ └───────────────────┘ In case of rdev(A) configured with `regulator-boot-on', the use_count of supplying regulator(B) will increment inside regulator_enable(rdev->supply). Thus, B will acts like always-on, and further balanced regulator_enable/disable cannot actually disable it anymore. However, B was also configured with `regulator-boot-on', we wish it could be disabled afterwards.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Nov 2025, 14:40

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0591b14ce0398125439c759f889647369aa616a0 - () https://git.kernel.org/stable/c/0591b14ce0398125439c759f889647369aa616a0 - Patch
References () https://git.kernel.org/stable/c/4b737246ff50f810d6ab4be13c1388a07f0c14b1 - () https://git.kernel.org/stable/c/4b737246ff50f810d6ab4be13c1388a07f0c14b1 - Patch
References () https://git.kernel.org/stable/c/4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347 - () https://git.kernel.org/stable/c/4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347 - Patch
References () https://git.kernel.org/stable/c/5bfc53df288e8ea54ca6866fb92034214940183f - () https://git.kernel.org/stable/c/5bfc53df288e8ea54ca6866fb92034214940183f - Patch
References () https://git.kernel.org/stable/c/bc6c381df5793ebcf32db88a3e65acf7870379fc - () https://git.kernel.org/stable/c/bc6c381df5793ebcf32db88a3e65acf7870379fc - Patch
References () https://git.kernel.org/stable/c/dc3391d49479bc2bf8a2b88dbf86fdd800882fee - () https://git.kernel.org/stable/c/dc3391d49479bc2bf8a2b88dbf86fdd800882fee - Patch
References () https://git.kernel.org/stable/c/feb847e6591e8c7a09cc39721cc9ca74fd9a5d80 - () https://git.kernel.org/stable/c/feb847e6591e8c7a09cc39721cc9ca74fd9a5d80 - Patch

15 Sep 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-15 14:15

Updated : 2025-11-25 14:40


NVD link : CVE-2022-50250

Mitre link : CVE-2022-50250

CVE.ORG link : CVE-2022-50250


JSON object : View

Products Affected

linux

  • linux_kernel