CVE-2022-50314

Source
https://cve.org/CVERecord?id=CVE-2022-50314
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50314.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50314
Downstream
Published
2025-09-15T14:46:09.240Z
Modified
2026-04-11T12:44:55.864187Z
Summary
nbd: Fix hung when signal interrupts nbd_start_device_ioctl()
Details

In the Linux kernel, the following vulnerability has been resolved:

nbd: Fix hung when signal interrupts nbdstartdevice_ioctl()

syzbot reported hung task [1]. The following program is a simplified version of the reproducer:

int main(void) { int sv[2], fd;

if (socketpair(AF_UNIX, SOCK_STREAM, 0, sv) < 0)
    return 1;
if ((fd = open("/dev/nbd0", 0)) < 0)
    return 1;
if (ioctl(fd, NBD_SET_SIZE_BLOCKS, 0x81) < 0)
    return 1;
if (ioctl(fd, NBD_SET_SOCK, sv[0]) < 0)
    return 1;
if (ioctl(fd, NBD_DO_IT) < 0)
    return 1;
return 0;

}

When signal interrupt nbdstartdeviceioctl() waiting the condition atomicread(&config->recv_threads) == 0, the task can hung because it waits the completion of the inflight IOs.

This patch fixes the issue by clearing queue, not just shutdown, when signal interrupt nbdstartdevice_ioctl().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50314.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5ea8d10802ec4c153a6e21eebaf412e2abd29736
Fixed
3ba3846cb3e2fb3c6fbf79e998472821b298419e
Fixed
c7b4641bd2395c2f3cd3b0a0cbf292ed9d489398
Fixed
3575949513ea3b387b30dac1e69468a923c86caf
Fixed
b2700f98b3f4dd19fb4315b70581e5caff89eb49
Fixed
c0d73be0af8c1310713bc39a8d7a22e35084e14f
Fixed
62006a72b05e0d38727eef5188700f2488be5e89
Fixed
35fb7d4a53d9e36d1b91161ea9870d9c6d57dccf
Fixed
1de7c3cf48fc41cd95adb12bd1ea9033a917798a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50314.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.12.0
Fixed
4.14.296
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.262
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.220
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.150
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50314.json"