๐Ÿ” CVE Alert

CVE-2022-50812

UNKNOWN 0.0

security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 A bad bug in clang's implementation of -fzero-call-used-regs can result in NULL pointer dereferences (see the links above the check for more information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a supported GCC version or a clang newer than 15.0.6, which will catch both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have the bug fixed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 30, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < 8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < 0b202dfedb5aa2e7d07d849be33fa3a48c026926 a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < 21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < d6a9fb87e9d18f3394a9845546bbe868efdccfd2
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c git.kernel.org: https://git.kernel.org/stable/c/0b202dfedb5aa2e7d07d849be33fa3a48c026926 git.kernel.org: https://git.kernel.org/stable/c/21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e git.kernel.org: https://git.kernel.org/stable/c/d6a9fb87e9d18f3394a9845546bbe868efdccfd2