CVE-2022-50778 — Out-of-bounds Read in Linux
Severity
3.3LOW
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL
With CONFIG_FORTIFY=y and CONFIG_UBSAN_LOCAL_BOUNDS=y enabled, we observe
a runtime panic while running Android's Compatibility Test Suite's (CTS)
android.hardware.input.cts.tests. This is stemming from a strlen()
call in hidinput_allocate().
__compiletime_strlen() is implemented in terms of __builtin_object_size(),
then does an array access to check for NUL-termina…
Affected Packages4 packages
▶CVEListV5linux/linux3009f891bb9f328945ebd5b71e12df7e2467f3dd — ed42391164e6839a48aaf4c53eefda516835e799+3
🔴Vulnerability Details
3GHSA▶
GHSA-h2v3-h25x-63cp: In the Linux kernel, the following vulnerability has been resolved:
fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL
With CONFIG_FORTIFY↗2025-12-24
OSV▶
CVE-2022-50778: In the Linux kernel, the following vulnerability has been resolved: fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL With CONFIG_FORTIFY=y↗2025-12-24