lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025032700-CVE-2022-49751-bf8f@gregkh>
Date: Thu, 27 Mar 2025 17:43:09 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2022-49751: w1: fix WARNING after calling w1_process()

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

w1: fix WARNING after calling w1_process()

I got the following WARNING message while removing driver(ds2482):

------------[ cut here ]------------
do not call blocking ops when !TASK_RUNNING; state=1 set at [<000000002d50bfb6>] w1_process+0x9e/0x1d0 [wire]
WARNING: CPU: 0 PID: 262 at kernel/sched/core.c:9817 __might_sleep+0x98/0xa0
CPU: 0 PID: 262 Comm: w1_bus_master1 Tainted: G                 N 6.1.0-rc3+ #307
RIP: 0010:__might_sleep+0x98/0xa0
Call Trace:
 exit_signals+0x6c/0x550
 do_exit+0x2b4/0x17e0
 kthread_exit+0x52/0x60
 kthread+0x16d/0x1e0
 ret_from_fork+0x1f/0x30

The state of task is set to TASK_INTERRUPTIBLE in loop in w1_process(),
set it to TASK_RUNNING when it breaks out of the loop to avoid the
warning.

The Linux kernel CVE team has assigned CVE-2022-49751 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 2.6.28 with commit 3c52e4e627896b42152cc6ff98216c302932227e and fixed in 4.14.305 with commit 190b5c3bbd5df685bb1063bda048831d72b8f1d4
	Issue introduced in 2.6.28 with commit 3c52e4e627896b42152cc6ff98216c302932227e and fixed in 4.19.272 with commit bccd6df4c177b1ad766f16565ccc298653d027d0
	Issue introduced in 2.6.28 with commit 3c52e4e627896b42152cc6ff98216c302932227e and fixed in 5.4.231 with commit 276052159ba94d4d9f5b453fb4707d6798c6b845
	Issue introduced in 2.6.28 with commit 3c52e4e627896b42152cc6ff98216c302932227e and fixed in 5.10.166 with commit 216f35db6ec6a667cd9db4838d657c1d2f4684da
	Issue introduced in 2.6.28 with commit 3c52e4e627896b42152cc6ff98216c302932227e and fixed in 5.15.91 with commit 89c62cee5d4d65ac75d99b5f986f7f94290e888f
	Issue introduced in 2.6.28 with commit 3c52e4e627896b42152cc6ff98216c302932227e and fixed in 6.1.9 with commit cfc7462ff824ed6718ed0272ee9aae88e20d469a
	Issue introduced in 2.6.28 with commit 3c52e4e627896b42152cc6ff98216c302932227e and fixed in 6.2 with commit 36225a7c72e9e3e1ce4001b6ce72849f5c9a2d3b

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-49751
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/w1/w1.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/190b5c3bbd5df685bb1063bda048831d72b8f1d4
	https://git.kernel.org/stable/c/bccd6df4c177b1ad766f16565ccc298653d027d0
	https://git.kernel.org/stable/c/276052159ba94d4d9f5b453fb4707d6798c6b845
	https://git.kernel.org/stable/c/216f35db6ec6a667cd9db4838d657c1d2f4684da
	https://git.kernel.org/stable/c/89c62cee5d4d65ac75d99b5f986f7f94290e888f
	https://git.kernel.org/stable/c/cfc7462ff824ed6718ed0272ee9aae88e20d469a
	https://git.kernel.org/stable/c/36225a7c72e9e3e1ce4001b6ce72849f5c9a2d3b

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ