CVE-2022-50445

Source
https://cve.org/CVERecord?id=CVE-2022-50445
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50445.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50445
Downstream
Published
2025-10-01T11:45:19.954Z
Modified
2026-04-11T12:44:57.271260Z
Summary
xfrm: Reinject transport-mode packets through workqueue
Details

In the Linux kernel, the following vulnerability has been resolved:

xfrm: Reinject transport-mode packets through workqueue

The following warning is displayed when the tcp6-multi-diffip11 stress test case of the LTP test suite is tested:

watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [ns-tcpserver:48198] CPU: 0 PID: 48198 Comm: ns-tcpserver Kdump: loaded Not tainted 6.0.0-rc6+ #39 Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : des3edeencrypt+0x27c/0x460 [libdes] lr : 0x3f sp : ffff80000ceaa1b0 x29: ffff80000ceaa1b0 x28: ffff0000df056100 x27: ffff0000e51e5280 x26: ffff80004df75030 x25: ffff0000e51e4600 x24: 000000000000003b x23: 0000000000802080 x22: 000000000000003d x21: 0000000000000038 x20: 0000000080000020 x19: 000000000000000a x18: 0000000000000033 x17: ffff0000e51e4780 x16: ffff80004e2d1448 x15: ffff80004e2d1248 x14: ffff0000e51e4680 x13: ffff80004e2d1348 x12: ffff80004e2d1548 x11: ffff80004e2d1848 x10: ffff80004e2d1648 x9 : ffff80004e2d1748 x8 : ffff80004e2d1948 x7 : 000000000bcaf83d x6 : 000000000000001b x5 : ffff80004e2d1048 x4 : 00000000761bf3bf x3 : 000000007f1dd0a3 x2 : ffff0000e51e4780 x1 : ffff0000e3b9a2f8 x0 : 00000000db44e872 Call trace: des3edeencrypt+0x27c/0x460 [libdes] cryptodes3edeencrypt+0x1c/0x30 [desgeneric] cryptocbcencrypt+0x148/0x190 cryptoskcipherencrypt+0x2c/0x40 cryptoauthencencrypt+0xc8/0xfc [authenc] cryptoaeadencrypt+0x2c/0x40 echainivencrypt+0x144/0x1a0 [echainiv] cryptoaeadencrypt+0x2c/0x40 esp6outputtail+0x1c8/0x5d0 [esp6] esp6output+0x120/0x278 [esp6] xfrmoutputone+0x458/0x4ec xfrmoutputresume+0x6c/0x1f0 xfrm_output+0xac/0x4ac __xfrm6output+0x130/0x270 xfrm6output+0x60/0xec ip6xmit+0x2ec/0x5bc inet6csk_xmit+0xbc/0x10c __tcptransmitskb+0x460/0x8c0 tcpwritexmit+0x348/0x890 __tcppushpending_frames+0x44/0x110 tcprcvestablished+0x3c8/0x720 tcpv6dorcv+0xdc/0x4a0 tcpv6rcv+0xc24/0xcb0 ip6protocoldeliverrcu+0xf0/0x574 ip6inputfinish+0x48/0x7c ip6input+0x48/0xc0 ip6rcvfinish+0x80/0x9c xfrmtransreinject+0xb0/0xf4 taskletactioncommon.constprop.0+0xf8/0x134 taskletaction+0x30/0x3c __dosoftirq+0x128/0x368 dosoftirq+0xb4/0xc0 __localbhenableip+0xb0/0xb4 putcpufpsimdcontext+0x40/0x70 kernelneonend+0x20/0x40 sha1basedoupdate.constprop.0.isra.0+0x11c/0x140 [sha1ce] sha1cefinup+0x94/0x110 [sha1ce] cryptoshashfinup+0x34/0xc0 hmacfinup+0x48/0xe0 cryptoshashfinup+0x34/0xc0 shashdigestunaligned+0x74/0x90 cryptoshashdigest+0x4c/0x9c shashahashdigest+0xc8/0xf0 shashasyncdigest+0x28/0x34 cryptoahashdigest+0x48/0xcc cryptoauthencgenicv+0x88/0xcc [authenc] cryptoauthencencrypt+0xd8/0xfc [authenc] cryptoaeadencrypt+0x2c/0x40 echainivencrypt+0x144/0x1a0 [echainiv] cryptoaeadencrypt+0x2c/0x40 esp6outputtail+0x1c8/0x5d0 [esp6] esp6output+0x120/0x278 [esp6] xfrmoutputone+0x458/0x4ec xfrmoutputresume+0x6c/0x1f0 xfrm_output+0xac/0x4ac __xfrm6output+0x130/0x270 xfrm6output+0x60/0xec ip6xmit+0x2ec/0x5bc inet6csk_xmit+0xbc/0x10c __tcptransmitskb+0x460/0x8c0 tcpwritexmit+0x348/0x890 __tcppushpending_frames+0x44/0x110 tcppush+0xb4/0x14c tcpsendmsglocked+0x71c/0xb64 tcpsendmsg+0x40/0x6c inet6sendmsg+0x4c/0x80 socksendmsg+0x5c/0x6c __sys_sendto+0x128/0x15c _arm64syssendto+0x30/0x40 invokesyscall+0x50/0x120 el0svccommon.constprop.0+0x170/0x194 doel0svc+0x38/0x4c el0svc+0x28/0xe0 el0t64synchandler+0xbc/0x13c el0t64sync+0x180/0x184

Get softirq info by bcc tool: ./softirqs -NT 10 Tracing soft irq event time... Hit Ctrl-C to end.

15:34:34 SOFTIRQ TOTALnsecs block 158990 timer 20030920 sched 46577080 netrx 676746820 tasklet 9906067650

15:34:45 SOFTIRQ TOTALnsecs block 86100 sched 38849790 netrx
---truncated---

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50445.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
acf568ee859f098279eadf551612f103afdacb4e
Fixed
7d98b26684cb2390729525b341ea099f0badbe18
Fixed
f520075da484306bbb8425afd2c42404ba74816f
Fixed
130d9e5017ade1b81d16783563edb38c12a2eab7
Fixed
4f4920669d21e1060b7243e5118dc3b71ced1276
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
69895c5ea0ca2e8d7de1e6d36965d0ab9730787f
Last affected
833760100588acfb267dac4d6a02ab9931237739
Last affected
e095ecaec6d94aa2156cceb98a85d409b51190f3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50445.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50445.json"