CVE-2022-50053

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50053
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50053.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50053
Downstream
Related
Published
2025-06-18T11:01:58Z
Modified
2025-10-21T11:59:59.727782Z
Summary
iavf: Fix reset error handling
Details

In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix reset error handling

Do not call iavfclose in iavfresettask error handling. Doing so can lead to double call of napidisable, which can lead to deadlock there. Removing VF would lead to iavfremove task being stuck, because it requires critlock, which is held by iavfclose. Call iavfdisablevf if reset fail, so that driver will clean up remaining invalid resources. During rapid VF resets, HW can fail to setup VF mailbox. Wrong error handling can lead to iavfremove being stuck with: [ 5218.999087] iavf 0000:82:01.0: Failed to init adminq: -53 ... [ 5267.189211] INFO: task repro.sh:11219 blocked for more than 30 seconds. [ 5267.189520] Tainted: G S E 5.18.0-04958-ga54ce3703613-dirty #1 [ 5267.189764] "echo 0 > /proc/sys/kernel/hungtasktimeoutsecs" disables this message. [ 5267.190062] task:repro.sh state:D stack: 0 pid:11219 ppid: 8162 flags:0x00000000 [ 5267.190347] Call Trace: [ 5267.190647] <TASK> [ 5267.190927] _schedule+0x460/0x9f0 [ 5267.191264] schedule+0x44/0xb0 [ 5267.191563] schedulepreemptdisabled+0x14/0x20 [ 5267.191890] _mutexlock.isra.12+0x6e3/0xac0 [ 5267.192237] ? iavfremove+0xf9/0x6c0 [iavf] [ 5267.192565] iavfremove+0x12a/0x6c0 [iavf] [ 5267.192911] ? rawspinunlockirqrestore+0x1e/0x40 [ 5267.193285] pcideviceremove+0x36/0xb0 [ 5267.193619] devicereleasedriverinternal+0xc1/0x150 [ 5267.193974] pcistopbusdevice+0x69/0x90 [ 5267.194361] pcistopandremovebusdevice+0xe/0x20 [ 5267.194735] pciiovremovevirtfn+0xba/0x120 [ 5267.195130] sriovdisable+0x2f/0xe0 [ 5267.195506] icefreevfs+0x7d/0x2f0 [ice] [ 5267.196056] ? pcigetdevice+0x4f/0x70 [ 5267.196496] icesriovconfigure+0x78/0x1a0 [ice] [ 5267.196995] sriovnumvfsstore+0xfe/0x140 [ 5267.197466] kernfsfopwriteiter+0x12e/0x1c0 [ 5267.197918] newsyncwrite+0x10c/0x190 [ 5267.198404] vfswrite+0x24e/0x2d0 [ 5267.198886] ksyswrite+0x5c/0xd0 [ 5267.199367] dosyscall64+0x3a/0x80 [ 5267.199827] entrySYSCALL64afterhwframe+0x46/0xb0 [ 5267.200317] RIP: 0033:0x7f5b381205c8 [ 5267.200814] RSP: 002b:00007fff8c7e8c78 EFLAGS: 00000246 ORIGRAX: 0000000000000001 [ 5267.201981] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5b381205c8 [ 5267.202620] RDX: 0000000000000002 RSI: 00005569420ee900 RDI: 0000000000000001 [ 5267.203426] RBP: 00005569420ee900 R08: 000000000000000a R09: 00007f5b38180820 [ 5267.204327] R10: 000000000000000a R11: 0000000000000246 R12: 00007f5b383c06e0 [ 5267.205193] R13: 0000000000000002 R14: 00007f5b383bb880 R15: 0000000000000002 [ 5267.206041] </TASK> [ 5267.206970] Kernel panic - not syncing: hungtask: blocked tasks [ 5267.207809] CPU: 48 PID: 551 Comm: khungtaskd Kdump: loaded Tainted: G S E 5.18.0-04958-ga54ce3703613-dirty #1 [ 5267.208726] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019 [ 5267.209623] Call Trace: [ 5267.210569] <TASK> [ 5267.211480] dumpstacklvl+0x33/0x42 [ 5267.212472] panic+0x107/0x294 [ 5267.213467] watchdog.cold.8+0xc/0xbb [ 5267.214413] ? procdohungtasktimeoutsecs+0x30/0x30 [ 5267.215511] kthread+0xf4/0x120 [ 5267.216459] ? kthreadcompleteandexit+0x20/0x20 [ 5267.217505] retfrom_fork+0x22/0x30 [ 5267.218459] </TASK>

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f0db78928783f0a4cce4940e8c03c2e9a760e629
Fixed
743dc4377bbac06a6fe44c3c5baf75a49439678a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f0db78928783f0a4cce4940e8c03c2e9a760e629
Fixed
0828e27971f18ea317710acb228afe6e72606082
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f0db78928783f0a4cce4940e8c03c2e9a760e629
Fixed
31071173771e079f7bc08dacd61e0db913262fbf

Affected versions

v4.*

v4.13
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1
v5.19.2
v5.19.3
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@31071173771e079f7bc08dacd61e0db913262fbf",
        "target": {
            "function": "iavf_reset_task",
            "file": "drivers/net/ethernet/intel/iavf/iavf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2022-50053-373651d9",
        "digest": {
            "function_hash": "154193440757963011596000186620449702868",
            "length": 4895.0
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@743dc4377bbac06a6fe44c3c5baf75a49439678a",
        "target": {
            "function": "iavf_reset_task",
            "file": "drivers/net/ethernet/intel/iavf/iavf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2022-50053-8174586a",
        "digest": {
            "function_hash": "89251748571699216851960034903166849369",
            "length": 4500.0
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@31071173771e079f7bc08dacd61e0db913262fbf",
        "target": {
            "file": "drivers/net/ethernet/intel/iavf/iavf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2022-50053-81adbfc9",
        "digest": {
            "line_hashes": [
                "105175814267830642338247347244244163804",
                "98061109139447983587039807359163214176",
                "196434191833164688073818094575595064644",
                "277667395006724247275345465154138579152",
                "195200076396820365077191957574735778775",
                "135267241526890131058553608888746714975",
                "18751321448748429586692140229435038739",
                "20487287636813837845444415235664159866",
                "253106010931192308881614387928549995555",
                "59409536501486834304223934221328582510"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0828e27971f18ea317710acb228afe6e72606082",
        "target": {
            "file": "drivers/net/ethernet/intel/iavf/iavf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2022-50053-8b72e9fe",
        "digest": {
            "line_hashes": [
                "105175814267830642338247347244244163804",
                "98061109139447983587039807359163214176",
                "196434191833164688073818094575595064644",
                "277667395006724247275345465154138579152",
                "195200076396820365077191957574735778775",
                "135267241526890131058553608888746714975",
                "18751321448748429586692140229435038739",
                "20487287636813837845444415235664159866",
                "253106010931192308881614387928549995555",
                "59409536501486834304223934221328582510"
            ],
            "threshold": 0.9
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0828e27971f18ea317710acb228afe6e72606082",
        "target": {
            "function": "iavf_reset_task",
            "file": "drivers/net/ethernet/intel/iavf/iavf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2022-50053-a2a5c164",
        "digest": {
            "function_hash": "154193440757963011596000186620449702868",
            "length": 4895.0
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@743dc4377bbac06a6fe44c3c5baf75a49439678a",
        "target": {
            "file": "drivers/net/ethernet/intel/iavf/iavf_main.c"
        },
        "signature_version": "v1",
        "deprecated": false,
        "signature_type": "Line",
        "id": "CVE-2022-50053-e2a59c40",
        "digest": {
            "line_hashes": [
                "105175814267830642338247347244244163804",
                "98061109139447983587039807359163214176",
                "196434191833164688073818094575595064644",
                "277667395006724247275345465154138579152",
                "195200076396820365077191957574735778775",
                "135267241526890131058553608888746714975",
                "18751321448748429586692140229435038739",
                "20487287636813837845444415235664159866",
                "253106010931192308881614387928549995555",
                "59409536501486834304223934221328582510"
            ],
            "threshold": 0.9
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.14.0
Fixed
5.15.63
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.4