DEBIAN-CVE-2025-37802

Source
https://security-tracker.debian.org/tracker/CVE-2025-37802
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-37802.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-37802
Upstream
Published
2025-05-08T07:15:51Z
Modified
2025-09-19T06:12:21Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix WARNING "do not call blocking ops when !TASKRUNNING" waiteventtimeout() will set the state of the current task to TASKUNINTERRUPTIBLE, before doing the condition check. This means that ksmbddurablescavengeralive() will try to acquire the mutex while already in a sleeping state. The scheduler warns us by giving the following warning: do not call blocking ops when !TASKRUNNING; state=2 set at [<0000000061515a6f>] preparetowaitevent+0x9f/0x6c0 WARNING: CPU: 2 PID: 4147 at kernel/sched/core.c:10099 _mightsleep+0x12f/0x160 mutex lock is not needed in ksmbddurablescavengeralive().

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}