{
  "threat_severity" : "Moderate",
  "public_date" : "2025-12-09T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: PCI: Fix pci_device_is_present() for VFs by checking PF",
    "id" : "2420272",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2420272"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-691",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nPCI: Fix pci_device_is_present() for VFs by checking PF\npci_device_is_present() previously didn't work for VFs because it reads the\nVendor and Device ID, which are 0xffff for VFs, which looks like they\naren't present.  Check the PF instead.\nWei Gong reported that if virtio I/O is in progress when the driver is\nunbound or \"0\" is written to /sys/.../sriov_numvfs, the virtio I/O\noperation hangs, which may result in output like this:\ntask:bash state:D stack:    0 pid: 1773 ppid:  1241 flags:0x00004002\nCall Trace:\nschedule+0x4f/0xc0\nblk_mq_freeze_queue_wait+0x69/0xa0\nblk_mq_freeze_queue+0x1b/0x20\nblk_cleanup_queue+0x3d/0xd0\nvirtblk_remove+0x3c/0xb0 [virtio_blk]\nvirtio_dev_remove+0x4b/0x80\n...\ndevice_unregister+0x1b/0x60\nunregister_virtio_device+0x18/0x30\nvirtio_pci_remove+0x41/0x80\npci_device_remove+0x3e/0xb0\nThis happened because pci_device_is_present(VF) returned \"false\" in\nvirtio_pci_remove(), so it called virtio_break_device().  The broken vq\nmeant that vring_interrupt() skipped the vq.callback() that would have\ncompleted the virtio I/O operation via virtblk_done().\n[bhelgaas: commit log, simplify to always use pci_physfn(), add stable tag]", "A flaw was found in the way the Linux kernel’s PCI subsystem detects the presence of devices for Single Root I/O Virtualization,Virtual Functions (VFs). The existing pci_device_is_present() implementation incorrectly determines that VFs are absent by reading the Vendor and Device IDs, which return 0xffff, leading to improper handling of these devices. An update has been provided to check the associated Physical Function (PF) to correctly determine device presence." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-11-07T00:00:00Z",
    "advisory" : "RHSA-2023:6583",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-362.8.1.el9_3"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-50636\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-50636\nhttps://lore.kernel.org/linux-cve-announce/2025120935-CVE-2022-50636-6d4d@gregkh/T" ],
  "name" : "CVE-2022-50636",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}