CVE-2022-49751

Source
https://cve.org/CVERecord?id=CVE-2022-49751
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49751.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49751
Downstream
Related
Published
2025-03-27T16:42:59.669Z
Modified
2026-03-20T11:47:11.721679Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
w1: fix WARNING after calling w1_process()
Details

In the Linux kernel, the following vulnerability has been resolved:

w1: fix WARNING after calling w1_process()

I got the following WARNING message while removing driver(ds2482):

------------[ cut here ]------------ do not call blocking ops when !TASKRUNNING; state=1 set at [<000000002d50bfb6>] w1process+0x9e/0x1d0 [wire] WARNING: CPU: 0 PID: 262 at kernel/sched/core.c:9817 __mightsleep+0x98/0xa0 CPU: 0 PID: 262 Comm: w1bus_master1 Tainted: G N 6.1.0-rc3+ #307 RIP: 0010:__mightsleep+0x98/0xa0 Call Trace: exitsignals+0x6c/0x550 doexit+0x2b4/0x17e0 kthreadexit+0x52/0x60 kthread+0x16d/0x1e0 retfromfork+0x1f/0x30

The state of task is set to TASKINTERRUPTIBLE in loop in w1process(), set it to TASK_RUNNING when it breaks out of the loop to avoid the warning.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49751.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3c52e4e627896b42152cc6ff98216c302932227e
Fixed
190b5c3bbd5df685bb1063bda048831d72b8f1d4
Fixed
bccd6df4c177b1ad766f16565ccc298653d027d0
Fixed
276052159ba94d4d9f5b453fb4707d6798c6b845
Fixed
216f35db6ec6a667cd9db4838d657c1d2f4684da
Fixed
89c62cee5d4d65ac75d99b5f986f7f94290e888f
Fixed
cfc7462ff824ed6718ed0272ee9aae88e20d469a
Fixed
36225a7c72e9e3e1ce4001b6ce72849f5c9a2d3b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49751.json"