Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-49751


In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !TASK_RUNNING; state=1 set at [<000000002d50bfb6>] w1_process+0x9e/0x1d0 [wire] WARNING: CPU: 0 PID: 262 at kernel/sched/core.c:9817 __might_sleep+0x98/0xa0 CPU: 0 PID: 262 Comm: w1_bus_master1 Tainted: G N 6.1.0-rc3+ #307 RIP: 0010:__might_sleep+0x98/0xa0 Call Trace: exit_signals+0x6c/0x550 do_exit+0x2b4/0x17e0 kthread_exit+0x52/0x60 kthread+0x16d/0x1e0 ret_from_fork+0x1f/0x30 The state of task is set to TASK_INTERRUPTIBLE in loop in w1_process(), set it to TASK_RUNNING when it breaks out of the loop to avoid the warning.


Published

2025-03-27T17:15:39.970

Last Modified

2025-10-01T20:17:09.927

Status

Modified

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 4.14.305 Yes
Operating System linux linux_kernel < 4.19.272 Yes
Operating System linux linux_kernel < 5.4.231 Yes
Operating System linux linux_kernel < 5.10.166 Yes
Operating System linux linux_kernel < 5.15.91 Yes
Operating System linux linux_kernel < 6.1.9 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes
Operating System linux linux_kernel 6.2 Yes

References