CVE-2022-50812Linux vulnerability

7 documents6 sources
Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6 A bad bug in clang's implementation of -fzero-call-used-regs can result in NULL pointer dereferences (see the links above the check for more information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a supported GCC version or a clang newer than 15.0.6, which will catch both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have the bug

Affected Packages4 packages

Linuxlinux/linux_kernel5.15.05.15.86+2
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linuxa82adfd5c7cb4b8bb37ef439aed954f9972bb6188a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c+4
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50812: In the Linux kernel, the following vulnerability has been resolved: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 152025-12-30
GHSA
GHSA-r8mh-3p67-p8fm: In the Linux kernel, the following vulnerability has been resolved: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 152025-12-30
OSV
security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.62025-12-30

📋Vendor Advisories

2
Red Hat
kernel: security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.62025-12-30
Debian
CVE-2022-50812: linux - In the Linux kernel, the following vulnerability has been resolved: security: R...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50812 Impact, Exploitability, and Mitigation Steps | Wiz