-
CVE-2025-38451
- EPSS 0.03%
- Veröffentlicht 25.07.2025 16:15:30
- Zuletzt bearbeitet 29.07.2025 14:14:55
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: md/md-bitmap: fix GPF in bitmap_get_stats() The commit message of commit 6ec1f0239485 ("md/md-bitmap: fix stats collection for external bitmaps") states: Remove the external bitmap check as the statistics should be available regardless of bitmap storage location. Return -EINVAL only for invalid bitmap with no storage (neither in superblock nor in external file). But, the code does not adhere to the above, as it does only check for a valid super-block for "internal" bitmaps. Hence, we observe: Oops: GPF, probably for non-canonical address 0x1cd66f1f40000028 RIP: 0010:bitmap_get_stats+0x45/0xd0 Call Trace: seq_read_iter+0x2b9/0x46a seq_read+0x12f/0x180 proc_reg_read+0x57/0xb0 vfs_read+0xf6/0x380 ksys_read+0x6d/0xf0 do_syscall_64+0x8c/0x1b0 entry_SYSCALL_64_after_hwframe+0x76/0x7e We fix this by checking the existence of a super-block for both the internal and external case.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a23b16ba3274961494f5ad236345d238364349ff
Version
065f4b1cd41d03702426af44193894b925607073
Status
affected
Version <
3d82a729530bd2110ba66e4a1f73461c776edec2
Version
0b5390aeaa85eb2f15e0e2ea0731c0995285db5e
Status
affected
Version <
3e0542701b37aa25b025d8531583458e4f014c2e
Version
eeeba7f43ae27835718a5f5ad6552a8983e75201
Status
affected
Version <
a18f9b08c70e10ea3a897058fee8a4f3b4c146ec
Version
6ec1f0239485028445d213d91cfee5242f3211ba
Status
affected
Version <
c17fb542dbd1db745c9feac15617056506dd7195
Version
6ec1f0239485028445d213d91cfee5242f3211ba
Status
affected
Version
896a6fbefc9050cf940ed57947eda6dc23aa58b0
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.15
Status
affected
Version <
6.15
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.146
Status
unaffected
Version <=
6.6.*
Version
6.6.99
Status
unaffected
Version <=
6.12.*
Version
6.12.39
Status
unaffected
Version <=
6.15.*
Version
6.15.7
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.061 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|