CVE-2022-50233

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50233
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50233.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50233
Downstream
Related
Published
2025-08-09T14:30:51Z
Modified
2025-10-29T20:28:54.934605Z
Summary
Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name}
Details

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: eir: Fix using strlen with hdev->{devname,shortname}

Both devname and shortname are not guaranteed to be NULL terminated so this instead use strnlen and then attempt to determine if the resulting string needs to be truncated or not.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4c3dbb2c312c9fafbac30d98c523b8b1f3455d78
Fixed
dd7b8cdde098cf9f7c8de409b5b7bbb98f97be80

Affected versions

v4.*

v4.13
v4.13-rc3
v4.13-rc4
v4.13-rc5
v4.13-rc6
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

Database specific

vanir_signatures

[
    {
        "id": "CVE-2022-50233-78530154",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "259586823150180560088682897429552224796",
                "217732897059802294689321888218814347745",
                "135707986452649680937963391610889433909",
                "66327685860077491775182332693521923617",
                "137303865067575976829842452860419832632",
                "97002085897307751328233271335909591097",
                "257661346504600189850661921948782276824",
                "114044247592243543317573504662969627330",
                "193197134446609996253995759128828658468",
                "103290570225193386576748288575925282800",
                "3385647997272105987693463210464279395",
                "216372509657766319408748591996892209678",
                "249041614171476742504241582685250533274",
                "302542695533002493423183487608140469655",
                "287942208215778369391312227328999927284",
                "104896939581155256945241775275762907172",
                "115893258097209877178868195919494717382",
                "268897393055239970994387502197113897898",
                "251759462949326147045936168568804456590",
                "10587497301506004314472594022940365545",
                "71670593816953825347582416585009832930",
                "64766697478789278527610593533517451801",
                "130610201585132445772329893639391126525",
                "250590650815926431569294849448820899574",
                "85584333015473083317600236274146731442"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "net/bluetooth/eir.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd7b8cdde098cf9f7c8de409b5b7bbb98f97be80",
        "signature_type": "Line",
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50233-904a7951",
        "deprecated": false,
        "digest": {
            "length": 745.0,
            "function_hash": "313610186663873716209104407766597863562"
        },
        "target": {
            "file": "net/bluetooth/eir.c",
            "function": "eir_append_local_name"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd7b8cdde098cf9f7c8de409b5b7bbb98f97be80",
        "signature_type": "Function",
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50233-a427f266",
        "deprecated": false,
        "digest": {
            "length": 575.0,
            "function_hash": "132158847661577801020575972787174765003"
        },
        "target": {
            "file": "net/bluetooth/mgmt.c",
            "function": "append_eir_data_to_buf"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd7b8cdde098cf9f7c8de409b5b7bbb98f97be80",
        "signature_type": "Function",
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50233-b4421f92",
        "deprecated": false,
        "digest": {
            "length": 993.0,
            "function_hash": "175433050832008359260497350188386202499"
        },
        "target": {
            "file": "net/bluetooth/eir.c",
            "function": "eir_create"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd7b8cdde098cf9f7c8de409b5b7bbb98f97be80",
        "signature_type": "Function",
        "signature_version": "v1"
    },
    {
        "id": "CVE-2022-50233-f7e1b373",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "72606123562362159035379512717382455352",
                "136081719015342077408883252755943267735",
                "100411044754396058065107130046040528179",
                "80013863380556988941286845919521525691",
                "286835386344619572433151935206616256317",
                "269026662833798872206921231555007797813",
                "135431099625826134156427893337365577701"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "net/bluetooth/mgmt.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd7b8cdde098cf9f7c8de409b5b7bbb98f97be80",
        "signature_type": "Line",
        "signature_version": "v1"
    }
]