Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-49751— w1: fix WARNING after calling w1_process()

EPSS 0.01% · P2

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinux3c52e4e627896b42152cc6ff98216c302932227e< 190b5c3bbd5df685bb1063bda048831d72b8f1d4affected
3c52e4e627896b42152cc6ff98216c302932227e< bccd6df4c177b1ad766f16565ccc298653d027d0affected
3c52e4e627896b42152cc6ff98216c302932227e< 276052159ba94d4d9f5b453fb4707d6798c6b845affected
3c52e4e627896b42152cc6ff98216c302932227e< 216f35db6ec6a667cd9db4838d657c1d2f4684daaffected
3c52e4e627896b42152cc6ff98216c302932227e< 89c62cee5d4d65ac75d99b5f986f7f94290e888faffected
3c52e4e627896b42152cc6ff98216c302932227e< cfc7462ff824ed6718ed0272ee9aae88e20d469aaffected
3c52e4e627896b42152cc6ff98216c302932227e< 36225a7c72e9e3e1ce4001b6ce72849f5c9a2d3baffected
2.6.28affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-49751

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
w1: fix WARNING after calling w1_process()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !TASK_RUNNING; state=1 set at [<000000002d50bfb6>] w1_process+0x9e/0x1d0 [wire] WARNING: CPU: 0 PID: 262 at kernel/sched/core.c:9817 __might_sleep+0x98/0xa0 CPU: 0 PID: 262 Comm: w1_bus_master1 Tainted: G N 6.1.0-rc3+ #307 RIP: 0010:__might_sleep+0x98/0xa0 Call Trace: exit_signals+0x6c/0x550 do_exit+0x2b4/0x17e0 kthread_exit+0x52/0x60 kthread+0x16d/0x1e0 ret_from_fork+0x1f/0x30 The state of task is set to TASK_INTERRUPTIBLE in loop in w1_process(), set it to TASK_RUNNING when it breaks out of the loop to avoid the warning.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于w1_process状态设置不当。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 3c52e4e627896b42152cc6ff98216c302932227e ~ 190b5c3bbd5df685bb1063bda048831d72b8f1d4 -
LinuxLinux 2.6.28 -

II. Public POCs for CVE-2022-49751

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-49751

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-03-27 · 124 CVEs total

CVE-2023-52982fscache: Use wait_on_bit() to wait for the freeing of relinquished volume
CVE-2023-52998net: fec: Use page_pool_put_full_page when freeing rx buffers
CVE-2023-52999net: fix UaF in netns ops registration error path
CVE-2023-52997ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()
CVE-2023-52996ipv4: prevent potential spectre v1 gadget in fib_metrics_match()
CVE-2023-52995riscv/kprobe: Fix instruction simulation of JALR
CVE-2023-52994acpi: Fix suspend with Xen PV
CVE-2023-52993x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL
CVE-2023-52992bpf: Skip task with pid=1 in send_signal_common()
CVE-2023-52991net: fix NULL pointer in skb_segment_list
CVE-2023-52989firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region
CVE-2023-52988ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()
CVE-2023-52987ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write()
CVE-2023-52986bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
CVE-2023-52985arm64: dts: imx8mm-verdin: Do not power down eth-phy
CVE-2023-52984net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices
CVE-2023-52973vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
CVE-2022-49761btrfs: always report error in run_one_delayed_ref()
CVE-2022-49760mm/hugetlb: fix PTE marker handling in hugetlb_change_protection()
CVE-2023-52974scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress

Showing top 20 of 124 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2022-49751

No comments yet


Leave a comment