Home

Description

In the Linux kernel, the following vulnerability has been resolved: net/ieee802154: don't warn zero-sized raw_sendmsg() syzbot is hitting skb_assert_len() warning at __dev_queue_xmit() [1], for PF_IEEE802154 socket's zero-sized raw_sendmsg() request is hitting __dev_queue_xmit() with skb->len == 0. Since PF_IEEE802154 socket's zero-sized raw_sendmsg() request was able to return 0, don't call __dev_queue_xmit() if packet length is 0. ---------- #include <sys/socket.h> #include <netinet/in.h> int main(int argc, char *argv[]) { struct sockaddr_in addr = { .sin_family = AF_INET, .sin_addr.s_addr = htonl(INADDR_LOOPBACK) }; struct iovec iov = { }; struct msghdr hdr = { .msg_name = &addr, .msg_namelen = sizeof(addr), .msg_iov = &iov, .msg_iovlen = 1 }; sendmsg(socket(PF_IEEE802154, SOCK_RAW, 0), &hdr, 0); return 0; } ---------- Note that this might be a sign that commit fd1894224407c484 ("bpf: Don't redirect packets with invalid pkt_len") should be reverted, for skb->len == 0 was acceptable for at least PF_IEEE802154 socket.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

8b68e53d56697a59b5c53893b53f508bbdf272a0 (git) before 4a36de8947794fa21435d1e916e089095f3246a8
affected

6204bf78b2a903b96ba43afff6abc0b04d6e0462 (git) before 791489a5c56396ddfed75fc525066d4738dace46
affected

a75987714bd2d8e59840667a28e15c1fa5c47554 (git) before 34f31a2b667914ab701ca725554a0b447809d7ef
affected

72f2dc8993f10262092745a88cb2dd0fef094f23 (git) before df0da3fc131132b6c32a15c4da4ffa3a5aea1af2
affected

fd1894224407c484f652ad456e1ce423e89bb3eb (git) before 9974d220c5073d035b5469d1d8ecd71da86c7afd
affected

fd1894224407c484f652ad456e1ce423e89bb3eb (git) before b12e924a2f5b960373459c8f8a514f887adf5cac
affected

Default status
affected

6.0
affected

Any version before 6.0
unaffected

5.4.220 (semver)
unaffected

5.10.150 (semver)
unaffected

5.15.75 (semver)
unaffected

5.19.17 (semver)
unaffected

6.0.3 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/4a36de8947794fa21435d1e916e089095f3246a8

git.kernel.org/...c/791489a5c56396ddfed75fc525066d4738dace46

git.kernel.org/...c/34f31a2b667914ab701ca725554a0b447809d7ef

git.kernel.org/...c/df0da3fc131132b6c32a15c4da4ffa3a5aea1af2

git.kernel.org/...c/9974d220c5073d035b5469d1d8ecd71da86c7afd

git.kernel.org/...c/b12e924a2f5b960373459c8f8a514f887adf5cac

cve.org (CVE-2022-50706)

nvd.nist.gov (CVE-2022-50706)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.