CVE-2022-50582
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-22

Last updated on: 2025-10-22

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: regulator: core: Prevent integer underflow By using a ratio of delay to poll_enabled_time that is not integer time_remaining underflows and does not exit the loop as expected. As delay could be derived from DT and poll_enabled_time is defined in the driver this can easily happen. Use a signed iterator to make sure that the loop exits once the remaining time is negative.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-22
Last Modified
2025-10-22
Generated
2026-05-06
AI Q&A
2025-10-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel regulator core involves an integer underflow caused by using a ratio of delay to poll_enabled_time that leads to time_remaining underflowing. As a result, a loop does not exit as expected. The issue arises because delay can be derived from device tree (DT) data and poll_enabled_time is defined in the driver, making the underflow likely. The fix involves using a signed iterator to ensure the loop exits once the remaining time becomes negative.


How can this vulnerability impact me? :

The vulnerability can cause a loop in the Linux kernel regulator core to not exit as expected due to integer underflow. This could potentially lead to unexpected behavior or system instability related to power regulation or device management within the kernel.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart