{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50250","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-15T13:58:00.973Z","datePublished":"2025-09-15T14:02:10.117Z","dateUpdated":"2026-05-11T19:15:40.800Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:15:40.800Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: core: fix use_count leakage when handling boot-on\n\nI found a use_count leakage towards supply regulator of rdev with\nboot-on option.\n\n┌───────────────────┐           ┌───────────────────┐\n│  regulator_dev A  │           │  regulator_dev B  │\n│     (boot-on)     │           │     (boot-on)     │\n│    use_count=0    │◀──supply──│    use_count=1    │\n│                   │           │                   │\n└───────────────────┘           └───────────────────┘\n\nIn case of rdev(A) configured with `regulator-boot-on', the use_count\nof supplying regulator(B) will increment inside\nregulator_enable(rdev->supply).\n\nThus, B will acts like always-on, and further balanced\nregulator_enable/disable cannot actually disable it anymore.\n\nHowever, B was also configured with `regulator-boot-on', we wish it\ncould be disabled afterwards."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/regulator/core.c"],"versions":[{"version":"dc1b1d7faf616ed663d0bba9be5abb4d1ed35d01","lessThan":"dc3391d49479bc2bf8a2b88dbf86fdd800882fee","status":"affected","versionType":"git"},{"version":"f44b07472f29ae313ce875dc7b9c75b100c608b8","lessThan":"5bfc53df288e8ea54ca6866fb92034214940183f","status":"affected","versionType":"git"},{"version":"089b3f61ecfc43ca4ea26d595e1d31ead6de3f7b","lessThan":"4b737246ff50f810d6ab4be13c1388a07f0c14b1","status":"affected","versionType":"git"},{"version":"089b3f61ecfc43ca4ea26d595e1d31ead6de3f7b","lessThan":"feb847e6591e8c7a09cc39721cc9ca74fd9a5d80","status":"affected","versionType":"git"},{"version":"089b3f61ecfc43ca4ea26d595e1d31ead6de3f7b","lessThan":"4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347","status":"affected","versionType":"git"},{"version":"089b3f61ecfc43ca4ea26d595e1d31ead6de3f7b","lessThan":"bc6c381df5793ebcf32db88a3e65acf7870379fc","status":"affected","versionType":"git"},{"version":"089b3f61ecfc43ca4ea26d595e1d31ead6de3f7b","lessThan":"0591b14ce0398125439c759f889647369aa616a0","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/regulator/core.c"],"versions":[{"version":"5.5","status":"affected"},{"version":"0","lessThan":"5.5","status":"unaffected","versionType":"semver"},{"version":"4.19.270","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.229","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.163","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.86","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.16","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.2","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.226","versionEndExcluding":"4.19.270"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.7","versionEndExcluding":"5.4.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.163"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.15.86"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"6.0.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"6.1.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/dc3391d49479bc2bf8a2b88dbf86fdd800882fee"},{"url":"https://git.kernel.org/stable/c/5bfc53df288e8ea54ca6866fb92034214940183f"},{"url":"https://git.kernel.org/stable/c/4b737246ff50f810d6ab4be13c1388a07f0c14b1"},{"url":"https://git.kernel.org/stable/c/feb847e6591e8c7a09cc39721cc9ca74fd9a5d80"},{"url":"https://git.kernel.org/stable/c/4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347"},{"url":"https://git.kernel.org/stable/c/bc6c381df5793ebcf32db88a3e65acf7870379fc"},{"url":"https://git.kernel.org/stable/c/0591b14ce0398125439c759f889647369aa616a0"}],"title":"regulator: core: fix use_count leakage when handling boot-on","x_generator":{"engine":"bippy-1.2.0"}}}}