CVE-2022-50582

Source
https://cve.org/CVERecord?id=CVE-2022-50582
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50582.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50582
Downstream
Related
Published
2025-10-22T13:23:34.037Z
Modified
2026-03-20T11:47:32.304888Z
Summary
regulator: core: Prevent integer underflow
Details

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: Prevent integer underflow

By using a ratio of delay to pollenabledtime that is not integer timeremaining underflows and does not exit the loop as expected. As delay could be derived from DT and pollenabled_time is defined in the driver this can easily happen.

Use a signed iterator to make sure that the loop exits once the remaining time is negative.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50582.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f7d7ad42a9dc2d63cab6a79fe31e6732a30dacf5
Fixed
b051d9bf98bd9cea312b228e264eb6542a9beb67
Fixed
e33da263e9658bfe870ea7836fbbd72f246d7dbd
Fixed
9f2395316e4845466cb9b5b9b15a171a2c91913c
Fixed
bfe602d9a349360e60e9051c9cafb9fef204524d
Fixed
8d8e16592022c9650df8aedfe6552ed478d7135b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50582.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.9.0
Fixed
5.10.150
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50582.json"