CVE-2022-50233
BaseFortify
Publication date: 2025-08-09
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's Bluetooth component involves improper use of the strlen function on dev_name and short_name fields, which are not guaranteed to be NULL terminated. This could lead to incorrect string length calculations. The fix involved using strnlen instead to safely determine the string length and whether truncation is needed.
How can this vulnerability impact me? :
The vulnerability could potentially cause incorrect handling of Bluetooth device names, which might lead to unexpected behavior or memory issues in the Linux kernel's Bluetooth subsystem. However, specific impacts such as exploitation or system compromise are not detailed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
There is no information provided about the impact of this vulnerability on compliance with standards or regulations such as GDPR or HIPAA.