CVE-2022-50582
Description
In the Linux kernel, the following vulnerability has been resolved:
regulator: core: Prevent integer underflow
By using a ratio of delay to poll_enabled_time that is not integer time_remaining underflows and does not exit the loop as expected. As delay could be derived from DT and poll_enabled_time is defined in the driver this can easily happen.
Use a signed iterator to make sure that the loop exits once the remaining time is negative.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Integer underflow in Linux kernel's regulator core when delay/poll_enabled_time ratio is non-integer, causing infinite loop.
Vulnerability
In the Linux kernel's regulator core, a vulnerability exists where an integer underflow can occur when computing the remaining time in a polling loop. The issue arises when the ratio of delay to poll_enabled_time is not an integer, causing time_remaining to underflow and preventing the loop from exiting as expected. Since delay can be derived from device tree (DT) and poll_enabled_time is defined in the driver, this condition can easily be triggered [1].
Exploitation
An attacker with the ability to influence the device tree or driver parameters could cause the regulator core to enter an infinite loop. This requires local access or the ability to modify DT configuration, but no authentication is needed beyond that. The loop does not exit because the underflow results in a large positive value for time_remaining, causing the loop to continue indefinitely [2].
Impact
Successful exploitation leads to a denial of service (DoS) condition, as the kernel thread handling the regulator polling will hang, potentially causing system instability or unresponsiveness. No privilege escalation or data leakage is reported.
Mitigation
The fix uses a signed iterator to ensure the loop exits once the remaining time becomes negative. Patches have been applied to the stable kernel tree [1][2]. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5b051d9bf98bde33da263e9659f2395316e48bfe602d9a3498d8e16592022Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/8d8e16592022c9650df8aedfe6552ed478d7135bnvd
- git.kernel.org/stable/c/9f2395316e4845466cb9b5b9b15a171a2c91913cnvd
- git.kernel.org/stable/c/b051d9bf98bd9cea312b228e264eb6542a9beb67nvd
- git.kernel.org/stable/c/bfe602d9a349360e60e9051c9cafb9fef204524dnvd
- git.kernel.org/stable/c/e33da263e9658bfe870ea7836fbbd72f246d7dbdnvd
News mentions
0No linked articles in our index yet.