CVE-2022-50812
security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 A bad bug in clang's implementation of -fzero-call-used-regs can result in NULL pointer dereferences (see the links above the check for more information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a supported GCC version or a clang newer than 15.0.6, which will catch both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have the bug fixed.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 30, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < 8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < 0b202dfedb5aa2e7d07d849be33fa3a48c026926 a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < 21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e a82adfd5c7cb4b8bb37ef439aed954f9972bb618 < d6a9fb87e9d18f3394a9845546bbe868efdccfd2
Linux / Linux
5.15
References
git.kernel.org: https://git.kernel.org/stable/c/8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c git.kernel.org: https://git.kernel.org/stable/c/0b202dfedb5aa2e7d07d849be33fa3a48c026926 git.kernel.org: https://git.kernel.org/stable/c/21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e git.kernel.org: https://git.kernel.org/stable/c/d6a9fb87e9d18f3394a9845546bbe868efdccfd2