DEBIAN-CVE-2022-50778

Source
https://security-tracker.debian.org/tracker/CVE-2022-50778
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50778.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-50778
Upstream
Published
2025-12-24T13:16:04.640Z
Modified
2026-03-11T07:35:53.577381Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: fortify: Fix __compiletimestrlen() under UBSANBOUNDSLOCAL With CONFIGFORTIFY=y and CONFIGUBSANLOCALBOUNDS=y enabled, we observe a runtime panic while running Android's Compatibility Test Suite's (CTS) android.hardware.input.cts.tests. This is stemming from a strlen() call in hidinputallocate(). __compiletime_strlen() is implemented in terms of __builtinobjectsize(), then does an array access to check for NUL-termination. A quirk of __builtinobjectsize() is that for strings whose values are runtime dependent, __builtinobjectsize(str, 1 or 0) returns the maximum size of possible values when those sizes are determinable at compile time. Example: static const char *v = "FOO BAR"; static const char *y = "FOO BA"; unsigned long x (int z) { // Returns 8, which is: // max(__builtinobjectsize(v, 1), __builtinobjectsize(y, 1)) return __builtinobjectsize(z ? v : y, 1); } So when FORTIFY_SOURCE is enabled, the current implementation of __compiletimestrlen() will try to access beyond the end of y at runtime using the size of v. Mixed with UBSANLOCALBOUNDS we get a fault. hidinputallocate() has a local C string whose value is control flow dependent on a switch statement, so __builtinobjectsize(str, 1) evaluates to the maximum string length, making all other cases fault on the last character check. hidinput_allocate() could be cleaned up to avoid runtime calls to strlen() since the local variable can only have literal values, so there's no benefit to trying to fortify the strlen call site there. Perform a _builtinconstantp() check against index 0 earlier in the macro to filter out the control-flow-dependant case. Add a KUnit test for checking the expected behavioral characteristics of FORTIFYSOURCE internals.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50778.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50778.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50778.json"