CVE-2022-50253Improper Handling of Length Parameter Inconsistency in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: make sure skb->len != 0 when redirecting to a tunneling device syzkaller managed to trigger another case where skb->len == 0 when we enter __dev_queue_xmit: WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline] WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295 Call Trace: dev_queue_xmit+0x17/0x20 net/core/dev

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.154.19.270+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux4e3264d21b90984c2165e8fe5a7b64cf25bc2c2dffbccc5fb0a67424e12f7f8da210c04c8063f797+8
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50253: In the Linux kernel, the following vulnerability has been resolved: bpf: make sure skb->len != 0 when redirecting to a tunneling device syzkaller mana2025-09-15
GHSA
GHSA-mmcv-ff9h-q89c: In the Linux kernel, the following vulnerability has been resolved: bpf: make sure skb->len != 0 when redirecting to a tunneling device syzkaller ma2025-09-15

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Denial of Service in network packet redirection2025-09-15
Debian
CVE-2022-50253: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: make s...2022
CVE-2022-50253 — Linux vulnerability | cvebase