-
CVE-2022-50582
- EPSS 0.03%
- Veröffentlicht 22.10.2025 13:23:34
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
regulator: core: Prevent integer underflow
In the Linux kernel, the following vulnerability has been resolved: regulator: core: Prevent integer underflow By using a ratio of delay to poll_enabled_time that is not integer time_remaining underflows and does not exit the loop as expected. As delay could be derived from DT and poll_enabled_time is defined in the driver this can easily happen. Use a signed iterator to make sure that the loop exits once the remaining time is negative.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
f7d7ad42a9dc2d63cab6a79fe31e6732a30dacf5
Version <
b051d9bf98bd9cea312b228e264eb6542a9beb67
Status
affected
Version
f7d7ad42a9dc2d63cab6a79fe31e6732a30dacf5
Version <
e33da263e9658bfe870ea7836fbbd72f246d7dbd
Status
affected
Version
f7d7ad42a9dc2d63cab6a79fe31e6732a30dacf5
Version <
9f2395316e4845466cb9b5b9b15a171a2c91913c
Status
affected
Version
f7d7ad42a9dc2d63cab6a79fe31e6732a30dacf5
Version <
bfe602d9a349360e60e9051c9cafb9fef204524d
Status
affected
Version
f7d7ad42a9dc2d63cab6a79fe31e6732a30dacf5
Version <
8d8e16592022c9650df8aedfe6552ed478d7135b
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.9
Status
affected
Version
0
Version <
5.9
Status
unaffected
Version <=
5.10.*
Version
5.10.150
Status
unaffected
Version <=
5.15.*
Version
5.15.75
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|