In the Linux kernel, the following vulnerability has been resolved:
driver core: Fix wait_for_device_probe() & deferred_probe_timeout interaction
Mounting NFS rootfs was timing out when deferred_probe_timeout was
non-zero [1]. This was because ip_auto_config() initcall times out
waiting for the network interfaces to show up when
deferred_probe_timeout was non-zero. While ip_auto_config() calls
wait_for_device_probe() to make sure any currently running deferred
probe work or asynchronous probe finishes, that wasn't sufficient to
account for devices being deferred until deferred_probe_timeout.
Commit 35a672363ab3 ("driver core: Ensure wait_for_device_probe() waits
until the deferred_probe_timeout fires") tried to fix that by making
sure wait_for_device_probe() waits for deferred_probe_timeout to expire
before returning.
However, if wait_for_device_probe() is called from the kernel_init()
context:
- Before deferred_probe_initcall() [2], it causes the boot process to
hang due to a deadlock.
- After deferred_probe_initcall() [3], it blocks kernel_init() from
continuing till deferred_probe_timeout expires and beats the point of
deferred_probe_timeout that's trying to wait for userspace to load
modules.
Neither of this is good. So revert the changes to
wait_for_device_probe().
[1] - https://lore.kernel.org/lkml/TYAPR01MB45443DF63B9EF29054F7C41FD8C60@TYAPR01MB4544.jpnprd01.prod.outlook.com/
[2] - https://lore.kernel.org/lkml/YowHNo4sBjr9ijZr@dev-arch.thelio-3990X/
[3] - https://lore.kernel.org/lkml/Yo3WvGnNk3LvLb7R@linutronix.de/
References
Configurations
Configuration 1 (hide)
|
History
22 Sep 2025, 20:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-667 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:5.7:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.7:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.7:rc7:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://git.kernel.org/stable/c/29357883a89193863f3cc6a2c5e0b42ceb022761 - Patch | |
References | () https://git.kernel.org/stable/c/4ad6af07efcca85369c21e4897b3020cff2c170b - Patch | |
References | () https://git.kernel.org/stable/c/528229474e1cbb1b3451cb713d94aecb5f6ee264 - Patch | |
References | () https://git.kernel.org/stable/c/5ee76c256e928455212ab759c51d198fedbe7523 - Patch | |
References | () https://git.kernel.org/stable/c/71cbce75031aed26c72c2dc8a83111d181685f1b - Patch |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-09-22 20:29
NVD link : CVE-2022-49379
Mitre link : CVE-2022-49379
CVE.ORG link : CVE-2022-49379
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking