CVE-2022-50636

Source
https://cve.org/CVERecord?id=CVE-2022-50636
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50636.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50636
Downstream
Related
Published
2025-12-09T00:00:09.737Z
Modified
2026-03-12T03:26:49.803157Z
Summary
PCI: Fix pci_device_is_present() for VFs by checking PF
Details

In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix pcideviceis_present() for VFs by checking PF

pcideviceis_present() previously didn't work for VFs because it reads the Vendor and Device ID, which are 0xffff for VFs, which looks like they aren't present. Check the PF instead.

Wei Gong reported that if virtio I/O is in progress when the driver is unbound or "0" is written to /sys/.../sriov_numvfs, the virtio I/O operation hangs, which may result in output like this:

task:bash state:D stack: 0 pid: 1773 ppid: 1241 flags:0x00004002 Call Trace: schedule+0x4f/0xc0 blkmqfreezequeuewait+0x69/0xa0 blkmqfreezequeue+0x1b/0x20 blkcleanupqueue+0x3d/0xd0 virtblkremove+0x3c/0xb0 [virtioblk] virtiodevremove+0x4b/0x80 ... deviceunregister+0x1b/0x60 unregistervirtiodevice+0x18/0x30 virtiopciremove+0x41/0x80 pcideviceremove+0x3e/0xb0

This happened because pcideviceispresent(VF) returned "false" in virtiopciremove(), so it called virtiobreakdevice(). The broken vq meant that vringinterrupt() skipped the vq.callback() that would have completed the virtio I/O operation via virtblk_done().

[bhelgaas: commit log, simplify to always use pci_physfn(), add stable tag]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50636.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8496e85c20e7836b3dec97780e40f420a3ae2801
Fixed
f4b44c7766dae2b8681f621941cabe9f14066d59
Fixed
643d77fda08d06f863af35e80a7e517ea61d9629
Fixed
65bd0962992abd42e77a05e68c7b40e7c73726d1
Fixed
99ef6cc791584495987dd11b14769b450dfa5820
Fixed
67fd41bbb0f51aa648a47f728b99e6f1fa2ccc34
Fixed
81565e51ccaf6fff8910e997ee22e16b5e1dabc3
Fixed
518573988a2f14f517403db2ece5ddaefba21e94
Fixed
98b04dd0b4577894520493d96bc4623387767445

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50636.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.13.0
Fixed
4.14.303
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.270
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.229
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.18
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50636.json"