CVE-2022-50250

Source
https://cve.org/CVERecord?id=CVE-2022-50250
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50250.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50250
Downstream
Related
Published
2025-09-15T14:02:10.117Z
Modified
2026-04-11T12:44:55.177980Z
Summary
regulator: core: fix use_count leakage when handling boot-on
Details

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix use_count leakage when handling boot-on

I found a use_count leakage towards supply regulator of rdev with boot-on option.

┌───────────────────┐ ┌───────────────────┐ │ regulatordev A │ │ regulatordev B │ │ (boot-on) │ │ (boot-on) │ │ usecount=0 │◀──supply──│ usecount=1 │ │ │ │ │ └───────────────────┘ └───────────────────┘

In case of rdev(A) configured with `regulator-boot-on', the usecount of supplying regulator(B) will increment inside regulatorenable(rdev->supply).

Thus, B will acts like always-on, and further balanced regulator_enable/disable cannot actually disable it anymore.

However, B was also configured with `regulator-boot-on', we wish it could be disabled afterwards.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50250.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dc1b1d7faf616ed663d0bba9be5abb4d1ed35d01
Fixed
dc3391d49479bc2bf8a2b88dbf86fdd800882fee
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f44b07472f29ae313ce875dc7b9c75b100c608b8
Fixed
5bfc53df288e8ea54ca6866fb92034214940183f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
089b3f61ecfc43ca4ea26d595e1d31ead6de3f7b
Fixed
4b737246ff50f810d6ab4be13c1388a07f0c14b1
Fixed
feb847e6591e8c7a09cc39721cc9ca74fd9a5d80
Fixed
4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347
Fixed
bc6c381df5793ebcf32db88a3e65acf7870379fc
Fixed
0591b14ce0398125439c759f889647369aa616a0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50250.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.270
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50250.json"