-
CVE-2022-50812
- EPSS 0.03%
- Veröffentlicht 30.12.2025 12:08:29
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6
In the Linux kernel, the following vulnerability has been resolved: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 A bad bug in clang's implementation of -fzero-call-used-regs can result in NULL pointer dereferences (see the links above the check for more information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a supported GCC version or a clang newer than 15.0.6, which will catch both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have the bug fixed.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version <
8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c
Status
affected
Version
a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version <
0b202dfedb5aa2e7d07d849be33fa3a48c026926
Status
affected
Version
a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version <
21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e
Status
affected
Version
a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Version <
d6a9fb87e9d18f3394a9845546bbe868efdccfd2
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.15
Status
affected
Version
0
Version <
5.15
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|