-

CVE-2022-50812

security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6

In the Linux kernel, the following vulnerability has been resolved:

security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6

A bad bug in clang's implementation of -fzero-call-used-regs can result
in NULL pointer dereferences (see the links above the check for more
information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a
supported GCC version or a clang newer than 15.0.6, which will catch
both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have
the bug fixed.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version < 8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c
Status affected
Version a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version < 0b202dfedb5aa2e7d07d849be33fa3a48c026926
Status affected
Version a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version < 21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e
Status affected
Version a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version < d6a9fb87e9d18f3394a9845546bbe868efdccfd2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.15
Status affected
Version 0
Version < 5.15
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.