CVE-2022-50778

Source
https://cve.org/CVERecord?id=CVE-2022-50778
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50778.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50778
Downstream
Published
2025-12-24T13:06:07.182Z
Modified
2026-03-12T03:26:53.253681Z
Summary
fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL
Details

In the Linux kernel, the following vulnerability has been resolved:

fortify: Fix _compiletimestrlen() under UBSANBOUNDSLOCAL

With CONFIGFORTIFY=y and CONFIGUBSANLOCALBOUNDS=y enabled, we observe a runtime panic while running Android's Compatibility Test Suite's (CTS) android.hardware.input.cts.tests. This is stemming from a strlen() call in hidinput_allocate().

__compiletime_strlen() is implemented in terms of __builtinobjectsize(), then does an array access to check for NUL-termination. A quirk of __builtinobjectsize() is that for strings whose values are runtime dependent, __builtinobjectsize(str, 1 or 0) returns the maximum size of possible values when those sizes are determinable at compile time. Example:

static const char *v = "FOO BAR"; static const char *y = "FOO BA"; unsigned long x (int z) { // Returns 8, which is: // max(__builtinobjectsize(v, 1), __builtinobjectsize(y, 1)) return __builtinobjectsize(z ? v : y, 1); }

So when FORTIFY_SOURCE is enabled, the current implementation of _compiletimestrlen() will try to access beyond the end of y at runtime using the size of v. Mixed with UBSANLOCALBOUNDS we get a fault.

hidinput_allocate() has a local C string whose value is control flow dependent on a switch statement, so _builtinobjectsize(str, 1) evaluates to the maximum string length, making all other cases fault on the last character check. hidinputallocate() could be cleaned up to avoid runtime calls to strlen() since the local variable can only have literal values, so there's no benefit to trying to fortify the strlen call site there.

Perform a _builtinconstantp() check against index 0 earlier in the macro to filter out the control-flow-dependant case. Add a KUnit test for checking the expected behavioral characteristics of FORTIFYSOURCE internals.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50778.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3009f891bb9f328945ebd5b71e12df7e2467f3dd
Fixed
ed42391164e6839a48aaf4c53eefda516835e799
Fixed
5d59ad2bfb35fccfe2ad5e8bb8801f6224d3f7d4
Fixed
d07c0acb4f41cc42a0d97530946965b3e4fa68c1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50778.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50778.json"