vulnerability
Debian: CVE-2022-50250: linux -- security update
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Sep 17, 2025 | Sep 17, 2025 | Oct 24, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix use_count leakage when handling boot-on I found a use_count leakage towards supply regulator of rdev with boot-on option. âââââââââââââââââââââ âââââââââââââââââââââ â regulator_dev A â â regulator_dev B â â (boot-on) â â (boot-on) â â use_count=0 ââââsupplyâââ use_count=1 â â â â â âââââââââââââââââââââ âââââââââââââââââââââ In case of rdev(A) configured with `regulator-boot-on', the use_count of supplying regulator(B) will increment inside regulator_enable(rdev->supply). Thus, B will acts like always-on, and further balanced regulator_enable/disable cannot actually disable it anymore. However, B was also configured with `regulator-boot-on', we wish it could be disabled afterwards.
Solution
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.