CVE-2022-50582
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel regulator core involves an integer underflow caused by using a ratio of delay to poll_enabled_time that leads to time_remaining underflowing. As a result, a loop does not exit as expected. The issue arises because delay can be derived from device tree (DT) data and poll_enabled_time is defined in the driver, making the underflow likely. The fix involves using a signed iterator to ensure the loop exits once the remaining time becomes negative.
How can this vulnerability impact me? :
The vulnerability can cause a loop in the Linux kernel regulator core to not exit as expected due to integer underflow. This could potentially lead to unexpected behavior or system instability related to power regulation or device management within the kernel.