CVE-2022-50636 (GCVE-0-2022-50636)
Vulnerability from cvelistv5
Published
2025-12-09 00:00
Modified
2025-12-23 13:30
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: PCI: Fix pci_device_is_present() for VFs by checking PF pci_device_is_present() previously didn't work for VFs because it reads the Vendor and Device ID, which are 0xffff for VFs, which looks like they aren't present. Check the PF instead. Wei Gong reported that if virtio I/O is in progress when the driver is unbound or "0" is written to /sys/.../sriov_numvfs, the virtio I/O operation hangs, which may result in output like this: task:bash state:D stack: 0 pid: 1773 ppid: 1241 flags:0x00004002 Call Trace: schedule+0x4f/0xc0 blk_mq_freeze_queue_wait+0x69/0xa0 blk_mq_freeze_queue+0x1b/0x20 blk_cleanup_queue+0x3d/0xd0 virtblk_remove+0x3c/0xb0 [virtio_blk] virtio_dev_remove+0x4b/0x80 ... device_unregister+0x1b/0x60 unregister_virtio_device+0x18/0x30 virtio_pci_remove+0x41/0x80 pci_device_remove+0x3e/0xb0 This happened because pci_device_is_present(VF) returned "false" in virtio_pci_remove(), so it called virtio_break_device(). The broken vq meant that vring_interrupt() skipped the vq.callback() that would have completed the virtio I/O operation via virtblk_done(). [bhelgaas: commit log, simplify to always use pci_physfn(), add stable tag]
Impacted products
Vendor Product Version
Linux Linux Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Version: 8496e85c20e7836b3dec97780e40f420a3ae2801
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/pci/pci.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "f4b44c7766dae2b8681f621941cabe9f14066d59",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            },
            {
              "lessThan": "643d77fda08d06f863af35e80a7e517ea61d9629",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            },
            {
              "lessThan": "65bd0962992abd42e77a05e68c7b40e7c73726d1",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            },
            {
              "lessThan": "99ef6cc791584495987dd11b14769b450dfa5820",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            },
            {
              "lessThan": "67fd41bbb0f51aa648a47f728b99e6f1fa2ccc34",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            },
            {
              "lessThan": "81565e51ccaf6fff8910e997ee22e16b5e1dabc3",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            },
            {
              "lessThan": "518573988a2f14f517403db2ece5ddaefba21e94",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            },
            {
              "lessThan": "98b04dd0b4577894520493d96bc4623387767445",
              "status": "affected",
              "version": "8496e85c20e7836b3dec97780e40f420a3ae2801",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/pci/pci.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.13"
            },
            {
              "lessThan": "3.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.303",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.270",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.229",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.163",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.87",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.*",
              "status": "unaffected",
              "version": "6.0.18",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.2",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.303",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.270",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.229",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.163",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.87",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0.18",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.4",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2",
                  "versionStartIncluding": "3.13",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Fix pci_device_is_present() for VFs by checking PF\n\npci_device_is_present() previously didn\u0027t work for VFs because it reads the\nVendor and Device ID, which are 0xffff for VFs, which looks like they\naren\u0027t present.  Check the PF instead.\n\nWei Gong reported that if virtio I/O is in progress when the driver is\nunbound or \"0\" is written to /sys/.../sriov_numvfs, the virtio I/O\noperation hangs, which may result in output like this:\n\n  task:bash state:D stack:    0 pid: 1773 ppid:  1241 flags:0x00004002\n  Call Trace:\n   schedule+0x4f/0xc0\n   blk_mq_freeze_queue_wait+0x69/0xa0\n   blk_mq_freeze_queue+0x1b/0x20\n   blk_cleanup_queue+0x3d/0xd0\n   virtblk_remove+0x3c/0xb0 [virtio_blk]\n   virtio_dev_remove+0x4b/0x80\n   ...\n   device_unregister+0x1b/0x60\n   unregister_virtio_device+0x18/0x30\n   virtio_pci_remove+0x41/0x80\n   pci_device_remove+0x3e/0xb0\n\nThis happened because pci_device_is_present(VF) returned \"false\" in\nvirtio_pci_remove(), so it called virtio_break_device().  The broken vq\nmeant that vring_interrupt() skipped the vq.callback() that would have\ncompleted the virtio I/O operation via virtblk_done().\n\n[bhelgaas: commit log, simplify to always use pci_physfn(), add stable tag]"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-23T13:30:23.226Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/f4b44c7766dae2b8681f621941cabe9f14066d59"
        },
        {
          "url": "https://git.kernel.org/stable/c/643d77fda08d06f863af35e80a7e517ea61d9629"
        },
        {
          "url": "https://git.kernel.org/stable/c/65bd0962992abd42e77a05e68c7b40e7c73726d1"
        },
        {
          "url": "https://git.kernel.org/stable/c/99ef6cc791584495987dd11b14769b450dfa5820"
        },
        {
          "url": "https://git.kernel.org/stable/c/67fd41bbb0f51aa648a47f728b99e6f1fa2ccc34"
        },
        {
          "url": "https://git.kernel.org/stable/c/81565e51ccaf6fff8910e997ee22e16b5e1dabc3"
        },
        {
          "url": "https://git.kernel.org/stable/c/518573988a2f14f517403db2ece5ddaefba21e94"
        },
        {
          "url": "https://git.kernel.org/stable/c/98b04dd0b4577894520493d96bc4623387767445"
        }
      ],
      "title": "PCI: Fix pci_device_is_present() for VFs by checking PF",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-50636",
    "datePublished": "2025-12-09T00:00:09.737Z",
    "dateReserved": "2025-12-08T23:57:43.370Z",
    "dateUpdated": "2025-12-23T13:30:23.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…