-

CVE-2025-38445

In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix stack memory use after return in raid1_reshape

In the raid1_reshape function, newpool is
allocated on the stack and assigned to conf->r1bio_pool.
This results in conf->r1bio_pool.wait.head pointing
to a stack address.
Accessing this address later can lead to a kernel panic.

Example access path:

raid1_reshape()
{
	// newpool is on the stack
	mempool_t newpool, oldpool;
	// initialize newpool.wait.head to stack address
	mempool_init(&newpool, ...);
	conf->r1bio_pool = newpool;
}

raid1_read_request() or raid1_write_request()
{
	alloc_r1bio()
	{
		mempool_alloc()
		{
			// if pool->alloc fails
			remove_element()
			{
				--pool->curr_nr;
			}
		}
	}
}

mempool_free()
{
	if (pool->curr_nr < pool->min_nr) {
		// pool->wait.head is a stack address
		// wake_up() will try to access this invalid address
		// which leads to a kernel panic
		return;
		wake_up(&pool->wait);
	}
}

Fix:
reinit conf->r1bio_pool.wait after assigning newpool.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < d8a6853d00fbaa810765c8ed2f452a5832273968
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
Version < 12b00ec99624f8da8c325f2dd6e807df26df0025
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
Version < 48da050b4f54ed639b66278d0ae6f4107b2c4e2d
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
Version < 5f35e48b76655e45522df338876dfef88dafcc71
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
Version < df5894014a92ff0196dbc212a7764e97366fd2b7
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
Version < 776e6186dc9ecbdb8a1b706e989166c8a99bbf64
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
Version < 61fd5e93006cf82ec8ee5c115ab5cf4bbd104bdb
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
Version < d67ed2ccd2d1dcfda9292c0ea8697a9d0f2f0d98
Version afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.18
Status affected
Version < 4.18
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.296
Status unaffected
Version <= 5.10.*
Version 5.10.240
Status unaffected
Version <= 5.15.*
Version 5.15.189
Status unaffected
Version <= 6.1.*
Version 6.1.146
Status unaffected
Version <= 6.6.*
Version 6.6.99
Status unaffected
Version <= 6.12.*
Version 6.12.39
Status unaffected
Version <= 6.15.*
Version 6.15.7
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string