CVE-2022-50812

Source
https://cve.org/CVERecord?id=CVE-2022-50812
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50812.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50812
Downstream
Published
2025-12-30T12:08:29.434Z
Modified
2026-04-02T08:28:46.591164Z
Summary
security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6
Details

In the Linux kernel, the following vulnerability has been resolved:

security: Restrict CONFIGZEROCALLUSEDREGS to gcc or clang > 15.0.6

A bad bug in clang's implementation of -fzero-call-used-regs can result in NULL pointer dereferences (see the links above the check for more information). Restrict CONFIGCCHASZEROCALLUSEDREGS to either a supported GCC version or a clang newer than 15.0.6, which will catch both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have the bug fixed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50812.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a82adfd5c7cb4b8bb37ef439aed954f9972bb618
Fixed
8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c
Fixed
0b202dfedb5aa2e7d07d849be33fa3a48c026926
Fixed
21ca0bfa11bbb9a9207f5d2104f47d3d71b4616e
Fixed
d6a9fb87e9d18f3394a9845546bbe868efdccfd2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50812.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50812.json"