CVE-2022-50582Integer Underflow (Wrap or Wraparound) in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 91.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22

Description

In the Linux kernel, the following vulnerability has been resolved: regulator: core: Prevent integer underflow By using a ratio of delay to poll_enabled_time that is not integer time_remaining underflows and does not exit the loop as expected. As delay could be derived from DT and poll_enabled_time is defined in the driver this can easily happen. Use a signed iterator to make sure that the loop exits once the remaining time is negative.

Affected Packages4 packages

Linuxlinux/linux_kernel5.9.05.10.150+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxf7d7ad42a9dc2d63cab6a79fe31e6732a30dacf5b051d9bf98bd9cea312b228e264eb6542a9beb67+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
regulator: core: Prevent integer underflow2025-10-22
OSV
CVE-2022-50582: In the Linux kernel, the following vulnerability has been resolved: regulator: core: Prevent integer underflow By using a ratio of delay to poll_enabl2025-10-22
GHSA
GHSA-2p3h-3pmw-fjvx: In the Linux kernel, the following vulnerability has been resolved: regulator: core: Prevent integer underflow By using a ratio of delay to poll_ena2025-10-22

📋Vendor Advisories

2
Red Hat
kernel: regulator: core: Prevent integer underflow2025-10-22
Debian
CVE-2022-50582: linux - In the Linux kernel, the following vulnerability has been resolved: regulator: ...2022