-

CVE-2022-50250

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix use_count leakage when handling boot-on

I found a use_count leakage towards supply regulator of rdev with
boot-on option.

┌───────────────────┐           ┌───────────────────┐
│  regulator_dev A  │           │  regulator_dev B  │
│     (boot-on)     │           │     (boot-on)     │
│    use_count=0    │◀──supply──│    use_count=1    │
│                   │           │                   │
└───────────────────┘           └───────────────────┘

In case of rdev(A) configured with `regulator-boot-on', the use_count
of supplying regulator(B) will increment inside
regulator_enable(rdev->supply).

Thus, B will acts like always-on, and further balanced
regulator_enable/disable cannot actually disable it anymore.

However, B was also configured with `regulator-boot-on', we wish it
could be disabled afterwards.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < dc3391d49479bc2bf8a2b88dbf86fdd800882fee
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5bfc53df288e8ea54ca6866fb92034214940183f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 4b737246ff50f810d6ab4be13c1388a07f0c14b1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < feb847e6591e8c7a09cc39721cc9ca74fd9a5d80
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < bc6c381df5793ebcf32db88a3e65acf7870379fc
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0591b14ce0398125439c759f889647369aa616a0
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string