CVE-2022-50445
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0.0-rc6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves the xfrm subsystem, specifically related to reinjecting transport-mode packets through a workqueue. It can cause a soft lockup, where the CPU becomes stuck for an extended period (e.g., 22 seconds) during certain network stress tests, indicating a potential deadlock or resource exhaustion in packet processing.
How can this vulnerability impact me? :
The vulnerability can lead to a soft lockup in the CPU, causing the system to become unresponsive or severely degraded in performance during network operations involving transport-mode packets. This can affect system stability and availability, potentially disrupting services relying on the Linux kernel's networking stack.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for soft lockup warnings in the kernel logs, such as messages indicating 'soft lockup - CPU#0 stuck for 22s'. Additionally, using the bcc tool to trace softirq event times can help identify abnormal softirq activity. For example, running the command './softirqs -NT 10' will trace softirq event times and may reveal excessive CPU time spent in tasklet or net_rx softirqs, which are related to this issue.