CVE-2022-49751

Source
https://cve.org/CVERecord?id=CVE-2022-49751
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49751.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49751
Downstream
Related
Published
2025-03-27T16:42:59.669Z
Modified
2026-04-11T12:44:29.011741Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
w1: fix WARNING after calling w1_process()
Details

In the Linux kernel, the following vulnerability has been resolved:

w1: fix WARNING after calling w1_process()

I got the following WARNING message while removing driver(ds2482):

------------[ cut here ]------------ do not call blocking ops when !TASKRUNNING; state=1 set at [<000000002d50bfb6>] w1process+0x9e/0x1d0 [wire] WARNING: CPU: 0 PID: 262 at kernel/sched/core.c:9817 __mightsleep+0x98/0xa0 CPU: 0 PID: 262 Comm: w1bus_master1 Tainted: G N 6.1.0-rc3+ #307 RIP: 0010:__mightsleep+0x98/0xa0 Call Trace: exitsignals+0x6c/0x550 doexit+0x2b4/0x17e0 kthreadexit+0x52/0x60 kthread+0x16d/0x1e0 retfromfork+0x1f/0x30

The state of task is set to TASKINTERRUPTIBLE in loop in w1process(), set it to TASK_RUNNING when it breaks out of the loop to avoid the warning.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49751.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3c52e4e627896b42152cc6ff98216c302932227e
Fixed
190b5c3bbd5df685bb1063bda048831d72b8f1d4
Fixed
bccd6df4c177b1ad766f16565ccc298653d027d0
Fixed
276052159ba94d4d9f5b453fb4707d6798c6b845
Fixed
216f35db6ec6a667cd9db4838d657c1d2f4684da
Fixed
89c62cee5d4d65ac75d99b5f986f7f94290e888f
Fixed
cfc7462ff824ed6718ed0272ee9aae88e20d469a
Fixed
36225a7c72e9e3e1ce4001b6ce72849f5c9a2d3b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49751.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.28
Fixed
4.14.305
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.272
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.231
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.166
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.91
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49751.json"