CVE-2022-50616
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free (UAF) issue in the Linux kernel's regulator core related to resource allocation and device tree (DT) lookup. It occurs because the initialization data (init_data) for a regulator device is allocated to the parent device instead of the child device that registered the regulator. When the parent device is released and its resources freed, the regulator core may still access the freed init_data, leading to a use-after-free condition.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to undefined behavior in the kernel, such as crashes, memory corruption, or potential escalation of privileges. This can affect system stability and security, possibly allowing attackers to exploit the kernel for malicious purposes.