ghsa-v49x-f2vh-6pj7
Vulnerability from github
Published
2025-09-15 15:31
Modified
2025-09-15 15:31
Details

In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix use_count leakage when handling boot-on

I found a use_count leakage towards supply regulator of rdev with boot-on option.

┌───────────────────┐ ┌───────────────────┐ │ regulator_dev A │ │ regulator_dev B │ │ (boot-on) │ │ (boot-on) │ │ use_count=0 │◀──supply──│ use_count=1 │ │ │ │ │ └───────────────────┘ └───────────────────┘

In case of rdev(A) configured with `regulator-boot-on', the use_count of supplying regulator(B) will increment inside regulator_enable(rdev->supply).

Thus, B will acts like always-on, and further balanced regulator_enable/disable cannot actually disable it anymore.

However, B was also configured with `regulator-boot-on', we wish it could be disabled afterwards.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2022-50250"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-09-15T14:15:35Z",
    "severity": null
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: core: fix use_count leakage when handling boot-on\n\nI found a use_count leakage towards supply regulator of rdev with\nboot-on option.\n\n\u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510           \u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510\n\u2502  regulator_dev A  \u2502           \u2502  regulator_dev B  \u2502\n\u2502     (boot-on)     \u2502           \u2502     (boot-on)     \u2502\n\u2502    use_count=0    \u2502\u25c0\u2500\u2500supply\u2500\u2500\u2502    use_count=1    \u2502\n\u2502                   \u2502           \u2502                   \u2502\n\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518           \u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518\n\nIn case of rdev(A) configured with `regulator-boot-on\u0027, the use_count\nof supplying regulator(B) will increment inside\nregulator_enable(rdev-\u003esupply).\n\nThus, B will acts like always-on, and further balanced\nregulator_enable/disable cannot actually disable it anymore.\n\nHowever, B was also configured with `regulator-boot-on\u0027, we wish it\ncould be disabled afterwards.",
  "id": "GHSA-v49x-f2vh-6pj7",
  "modified": "2025-09-15T15:31:22Z",
  "published": "2025-09-15T15:31:22Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50250"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/0591b14ce0398125439c759f889647369aa616a0"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/4b737246ff50f810d6ab4be13c1388a07f0c14b1"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/4dd6e1cc9c7403f1ee1b7eee85bc31b797ae8347"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/5bfc53df288e8ea54ca6866fb92034214940183f"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/bc6c381df5793ebcf32db88a3e65acf7870379fc"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/dc3391d49479bc2bf8a2b88dbf86fdd800882fee"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/feb847e6591e8c7a09cc39721cc9ca74fd9a5d80"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…