CVE-2022-50171

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
28/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> crypto: hisilicon/sec - don&amp;#39;t sleep when in softirq<br /> <br /> When kunpeng920 encryption driver is used to deencrypt and decrypt<br /> packets during the softirq, it is not allowed to use mutex lock. The<br /> kernel will report the following error:<br /> <br /> BUG: scheduling while atomic: swapper/57/0/0x00000300<br /> Call trace:<br /> dump_backtrace+0x0/0x1e4<br /> show_stack+0x20/0x2c<br /> dump_stack+0xd8/0x140<br /> __schedule_bug+0x68/0x80<br /> __schedule+0x728/0x840<br /> schedule+0x50/0xe0<br /> schedule_preempt_disabled+0x18/0x24<br /> __mutex_lock.constprop.0+0x594/0x5dc<br /> __mutex_lock_slowpath+0x1c/0x30<br /> mutex_lock+0x50/0x60<br /> sec_request_init+0x8c/0x1a0 [hisi_sec2]<br /> sec_process+0x28/0x1ac [hisi_sec2]<br /> sec_skcipher_crypto+0xf4/0x1d4 [hisi_sec2]<br /> sec_skcipher_encrypt+0x1c/0x30 [hisi_sec2]<br /> crypto_skcipher_encrypt+0x2c/0x40<br /> crypto_authenc_encrypt+0xc8/0xfc [authenc]<br /> crypto_aead_encrypt+0x2c/0x40<br /> echainiv_encrypt+0x144/0x1a0 [echainiv]<br /> crypto_aead_encrypt+0x2c/0x40<br /> esp_output_tail+0x348/0x5c0 [esp4]<br /> esp_output+0x120/0x19c [esp4]<br /> xfrm_output_one+0x25c/0x4d4<br /> xfrm_output_resume+0x6c/0x1fc<br /> xfrm_output+0xac/0x3c0<br /> xfrm4_output+0x64/0x130<br /> ip_build_and_send_pkt+0x158/0x20c<br /> tcp_v4_send_synack+0xdc/0x1f0<br /> tcp_conn_request+0x7d0/0x994<br /> tcp_v4_conn_request+0x58/0x6c<br /> tcp_v6_conn_request+0xf0/0x100<br /> tcp_rcv_state_process+0x1cc/0xd60<br /> tcp_v4_do_rcv+0x10c/0x250<br /> tcp_v4_rcv+0xfc4/0x10a4<br /> ip_protocol_deliver_rcu+0xf4/0x200<br /> ip_local_deliver_finish+0x58/0x70<br /> ip_local_deliver+0x68/0x120<br /> ip_sublist_rcv_finish+0x70/0x94<br /> ip_list_rcv_finish.constprop.0+0x17c/0x1d0<br /> ip_sublist_rcv+0x40/0xb0<br /> ip_list_rcv+0x140/0x1dc<br /> __netif_receive_skb_list_core+0x154/0x28c<br /> __netif_receive_skb_list+0x120/0x1a0<br /> netif_receive_skb_list_internal+0xe4/0x1f0<br /> napi_complete_done+0x70/0x1f0<br /> gro_cell_poll+0x9c/0xb0<br /> napi_poll+0xcc/0x264<br /> net_rx_action+0xd4/0x21c<br /> __do_softirq+0x130/0x358<br /> irq_exit+0x11c/0x13c<br /> __handle_domain_irq+0x88/0xf0<br /> gic_handle_irq+0x78/0x2c0<br /> el1_irq+0xb8/0x140<br /> arch_cpu_idle+0x18/0x40<br /> default_idle_call+0x5c/0x1c0<br /> cpuidle_idle_call+0x174/0x1b0<br /> do_idle+0xc8/0x160<br /> cpu_startup_entry+0x30/0x11c<br /> secondary_start_kernel+0x158/0x1e4<br /> softirq: huh, entered softirq 3 NET_RX 0000000093774ee4 with<br /> preempt_count 00000100, exited with fffffe00?

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.137 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.61 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.19 (including) 5.19.2 (excluding)