First published: Thu May 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix WARNING "do not call blocking ops when !TASK_RUNNING" wait_event_timeout() will set the state of the current task to TASK_UNINTERRUPTIBLE, before doing the condition check. This means that ksmbd_durable_scavenger_alive() will try to acquire the mutex while already in a sleeping state. The scheduler warns us by giving the following warning: do not call blocking ops when !TASK_RUNNING; state=2 set at [<0000000061515a6f>] prepare_to_wait_event+0x9f/0x6c0 WARNING: CPU: 2 PID: 4147 at kernel/sched/core.c:10099 __might_sleep+0x12f/0x160 mutex lock is not needed in ksmbd_durable_scavenger_alive().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37802 has a moderate severity level due to its potential impact on system stability.
To fix CVE-2025-37802, update to the latest version of the Linux kernel that includes the patch for this vulnerability.
CVE-2025-37802 affects various versions of the Linux kernel where the ksmbd module is utilized.
CVE-2025-37802 is a kernel vulnerability related to improper handling of task states in the ksmbd module.
Currently, there is no known effective workaround for CVE-2025-37802; applying the kernel update is recommended.