๐Ÿ” CVE Alert

CVE-2022-50706

UNKNOWN 0.0

net/ieee802154: don't warn zero-sized raw_sendmsg()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/ieee802154: don't warn zero-sized raw_sendmsg() syzbot is hitting skb_assert_len() warning at __dev_queue_xmit() [1], for PF_IEEE802154 socket's zero-sized raw_sendmsg() request is hitting __dev_queue_xmit() with skb->len == 0. Since PF_IEEE802154 socket's zero-sized raw_sendmsg() request was able to return 0, don't call __dev_queue_xmit() if packet length is 0. ---------- #include <sys/socket.h> #include <netinet/in.h> int main(int argc, char *argv[]) { struct sockaddr_in addr = { .sin_family = AF_INET, .sin_addr.s_addr = htonl(INADDR_LOOPBACK) }; struct iovec iov = { }; struct msghdr hdr = { .msg_name = &addr, .msg_namelen = sizeof(addr), .msg_iov = &iov, .msg_iovlen = 1 }; sendmsg(socket(PF_IEEE802154, SOCK_RAW, 0), &hdr, 0); return 0; } ---------- Note that this might be a sign that commit fd1894224407c484 ("bpf: Don't redirect packets with invalid pkt_len") should be reverted, for skb->len == 0 was acceptable for at least PF_IEEE802154 socket.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8b68e53d56697a59b5c53893b53f508bbdf272a0 < 4a36de8947794fa21435d1e916e089095f3246a8 6204bf78b2a903b96ba43afff6abc0b04d6e0462 < 791489a5c56396ddfed75fc525066d4738dace46 a75987714bd2d8e59840667a28e15c1fa5c47554 < 34f31a2b667914ab701ca725554a0b447809d7ef 72f2dc8993f10262092745a88cb2dd0fef094f23 < df0da3fc131132b6c32a15c4da4ffa3a5aea1af2 fd1894224407c484f652ad456e1ce423e89bb3eb < 9974d220c5073d035b5469d1d8ecd71da86c7afd fd1894224407c484f652ad456e1ce423e89bb3eb < b12e924a2f5b960373459c8f8a514f887adf5cac
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4a36de8947794fa21435d1e916e089095f3246a8 git.kernel.org: https://git.kernel.org/stable/c/791489a5c56396ddfed75fc525066d4738dace46 git.kernel.org: https://git.kernel.org/stable/c/34f31a2b667914ab701ca725554a0b447809d7ef git.kernel.org: https://git.kernel.org/stable/c/df0da3fc131132b6c32a15c4da4ffa3a5aea1af2 git.kernel.org: https://git.kernel.org/stable/c/9974d220c5073d035b5469d1d8ecd71da86c7afd git.kernel.org: https://git.kernel.org/stable/c/b12e924a2f5b960373459c8f8a514f887adf5cac