VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2022-50582

CVE-2022-50582

Description

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: Prevent integer underflow

By using a ratio of delay to poll_enabled_time that is not integer time_remaining underflows and does not exit the loop as expected. As delay could be derived from DT and poll_enabled_time is defined in the driver this can easily happen.

Use a signed iterator to make sure that the loop exits once the remaining time is negative.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Integer underflow in Linux kernel's regulator core when delay/poll_enabled_time ratio is non-integer, causing infinite loop.

Vulnerability

In the Linux kernel's regulator core, a vulnerability exists where an integer underflow can occur when computing the remaining time in a polling loop. The issue arises when the ratio of delay to poll_enabled_time is not an integer, causing time_remaining to underflow and preventing the loop from exiting as expected. Since delay can be derived from device tree (DT) and poll_enabled_time is defined in the driver, this condition can easily be triggered [1].

Exploitation

An attacker with the ability to influence the device tree or driver parameters could cause the regulator core to enter an infinite loop. This requires local access or the ability to modify DT configuration, but no authentication is needed beyond that. The loop does not exit because the underflow results in a large positive value for time_remaining, causing the loop to continue indefinitely [2].

Impact

Successful exploitation leads to a denial of service (DoS) condition, as the kernel thread handling the regulator polling will hang, potentially causing system instability or unresponsiveness. No privilege escalation or data leakage is reported.

Mitigation

The fix uses a signed iterator to ensure the loop exits once the remaining time becomes negative. Patches have been applied to the stable kernel tree [1][2]. Users should update to a kernel version containing the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.