CVE-2022-49520

Source
https://cve.org/CVERecord?id=CVE-2022-49520
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49520.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49520
Downstream
Related
Published
2025-02-26T02:13:46.336Z
Modified
2026-03-12T03:25:19.504505Z
Summary
arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall
Details

In the Linux kernel, the following vulnerability has been resolved:

arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall

If a compat process tries to execute an unknown system call above the __ARMNRCOMPATEND number, the kernel sends a SIGILL signal to the offending process. Information about the error is printed to dmesg in compatarmsyscall() -> arm64notifydie() -> arm64forcesigfault() -> arm64showsignal().

arm64showsignal() interprets a non-zero value for current->thread.faultcode as an exception syndrome and displays the message associated with the ESRELx.EC field (bits 31:26). current->thread.faultcode is set in compatarmsyscall() -> arm64notifydie() with the bad syscall number instead of a valid ESRELx value. This means that the ESRELx.EC field has the value that the user set for the syscall number and the kernel can end up printing bogus exception messages*. For example, for the syscall number 0x68000000, which evaluates to ESRELx.EC value of 0x1A (ESRELxEC_FPAC) the kernel prints this error:

[ 18.350639] CPU: 2 PID: 300 Comm: syscall Not tainted 5.18.0-rc1 #79 [ 18.351249] Hardware name: Pine64 RockPro64 v2.0 (DT) [..]

which is misleading, as the bad compat syscall has nothing to do with pointer authentication.

Stop arm64showsignal() from printing exception syndrome information by having compatarmsyscall() set the ESR_ELx value to 0, as it has no meaning for an invalid system call number. The example above now becomes:

[ 19.936124] CPU: 1 PID: 301 Comm: syscall Not tainted 5.18.0-rc1-00005-g7e08006d4102 #80 [ 19.936894] Hardware name: Pine64 RockPro64 v2.0 (DT) [..]

which although shows less information because the syscall number, wrongfully advertised as the ESR value, is missing, it is better than showing plainly wrong information. The syscall number can be easily obtained with strace.

*A 32-bit value above or equal to 0x80000000 is interpreted as a negative integer in compatarm_syscal() and the condition scno < _ARMNRCOMPATEND evaluates to true; the syscall will exit to userspace in this case with the ENOSYS error code instead of arm64notifydie() being called.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49520.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0be7320a635c2e434e8b67e0e9474a85ceb421c4
Fixed
efd183d988b416fcdf6f7c298a17ced4859ca77d
Fixed
ad97425d23af3c3b8d4f6a2bb666cb485087c007
Fixed
621916afe8cd4f322eb12759b64a2f938d4e551d
Fixed
095e975f8150ccd7f852eb578c1cdbdd2f517c7a
Fixed
3910ae71cb963fa2b68e684489d4fc3d105afda0
Fixed
3fed9e551417b84038b15117732ea4505eee386b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49520.json"