{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50430","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-17T14:53:07.009Z","datePublished":"2025-10-01T11:42:08.708Z","dateUpdated":"2026-05-11T19:19:20.655Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:19:20.655Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: vub300: fix warning - do not call blocking ops when !TASK_RUNNING\n\nvub300_enable_sdio_irq() works with mutex and need TASK_RUNNING here.\nEnsure that we mark current as TASK_RUNNING for sleepable context.\n\n[   77.554641] do not call blocking ops when !TASK_RUNNING; state=1 set at [<ffffffff92a72c1d>] sdio_irq_thread+0x17d/0x5b0\n[   77.554652] WARNING: CPU: 2 PID: 1983 at kernel/sched/core.c:9813 __might_sleep+0x116/0x160\n[   77.554905] CPU: 2 PID: 1983 Comm: ksdioirqd/mmc1 Tainted: G           OE      6.1.0-rc5 #1\n[   77.554910] Hardware name: Intel(R) Client Systems NUC8i7BEH/NUC8BEB, BIOS BECFL357.86A.0081.2020.0504.1834 05/04/2020\n[   77.554912] RIP: 0010:__might_sleep+0x116/0x160\n[   77.554920] RSP: 0018:ffff888107b7fdb8 EFLAGS: 00010282\n[   77.554923] RAX: 0000000000000000 RBX: ffff888118c1b740 RCX: 0000000000000000\n[   77.554926] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffed1020f6ffa9\n[   77.554928] RBP: ffff888107b7fde0 R08: 0000000000000001 R09: ffffed1043ea60ba\n[   77.554930] R10: ffff88821f5305cb R11: ffffed1043ea60b9 R12: ffffffff93aa3a60\n[   77.554932] R13: 000000000000011b R14: 7fffffffffffffff R15: ffffffffc0558660\n[   77.554934] FS:  0000000000000000(0000) GS:ffff88821f500000(0000) knlGS:0000000000000000\n[   77.554937] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   77.554939] CR2: 00007f8a44010d68 CR3: 000000024421a003 CR4: 00000000003706e0\n[   77.554942] Call Trace:\n[   77.554944]  <TASK>\n[   77.554952]  mutex_lock+0x78/0xf0\n[   77.554973]  vub300_enable_sdio_irq+0x103/0x3c0 [vub300]\n[   77.554981]  sdio_irq_thread+0x25c/0x5b0\n[   77.555006]  kthread+0x2b8/0x370\n[   77.555017]  ret_from_fork+0x1f/0x30\n[   77.555023]  </TASK>\n[   77.555025] ---[ end trace 0000000000000000 ]---"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/vub300.c"],"versions":[{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"32d5af247d4de6a35769ca1d027480a37c28fd0c","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"48e91ae755f027d817ed7e51db9963ddb7081946","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"6f7258c6f66692b3760c37ddd4bc9e02bb290da7","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"f1c08947ab0538b07a0bd9d6edadfb5185f56344","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"b51d5fed9f53e07ce9fc65efb4ff1abe021a4c16","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"d58289fc77f8c1f879c818bddaf7ef524c73658b","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"d15946ef98f4ccdca961b76f90d9b53c454d590e","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"ba2e7d07dd06e646a72ba906a89fdc1cca7ea560","status":"affected","versionType":"git"},{"version":"88095e7b473a3d9ec3b9c60429576e9cbd327c89","lessThan":"4a44cd249604e29e7b90ae796d7692f5773dd348","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/vub300.c"],"versions":[{"version":"3.0","status":"affected"},{"version":"0","lessThan":"3.0","status":"unaffected","versionType":"semver"},{"version":"4.9.337","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.303","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.270","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.229","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.163","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.87","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.17","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.3","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.9.337"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.14.303"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.19.270"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"5.4.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"5.10.163"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"5.15.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.0.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.1.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/32d5af247d4de6a35769ca1d027480a37c28fd0c"},{"url":"https://git.kernel.org/stable/c/48e91ae755f027d817ed7e51db9963ddb7081946"},{"url":"https://git.kernel.org/stable/c/6f7258c6f66692b3760c37ddd4bc9e02bb290da7"},{"url":"https://git.kernel.org/stable/c/f1c08947ab0538b07a0bd9d6edadfb5185f56344"},{"url":"https://git.kernel.org/stable/c/b51d5fed9f53e07ce9fc65efb4ff1abe021a4c16"},{"url":"https://git.kernel.org/stable/c/d58289fc77f8c1f879c818bddaf7ef524c73658b"},{"url":"https://git.kernel.org/stable/c/d15946ef98f4ccdca961b76f90d9b53c454d590e"},{"url":"https://git.kernel.org/stable/c/ba2e7d07dd06e646a72ba906a89fdc1cca7ea560"},{"url":"https://git.kernel.org/stable/c/4a44cd249604e29e7b90ae796d7692f5773dd348"}],"title":"mmc: vub300: fix warning - do not call blocking ops when !TASK_RUNNING","x_generator":{"engine":"bippy-1.2.0"}}}}