Home

Description

In the Linux kernel, the following vulnerability has been resolved: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 A bad bug in clang's implementation of -fzero-call-used-regs can result in NULL pointer dereferences (see the links above the check for more information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a supported GCC version or a clang newer than 15.0.6, which will catch both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have the bug fixed.

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 0b202dfedb5aa2e7d07d849be33fa3a48c026926
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d6a9fb87e9d18f3394a9845546bbe868efdccfd2
affected

Default status
affected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c

git.kernel.org/...c/0b202dfedb5aa2e7d07d849be33fa3a48c026926

git.kernel.org/...c/21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e

git.kernel.org/...c/d6a9fb87e9d18f3394a9845546bbe868efdccfd2

cve.org (CVE-2022-50812)

nvd.nist.gov (CVE-2022-50812)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.