CVE-2025-38445

HIGH

Linux Kernel < 5.4.296 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: md/raid1: Fix stack memory use after return in raid1_reshape In the raid1_reshape function, newpool is allocated on the stack and assigned to conf->r1bio_pool. This results in conf->r1bio_pool.wait.head pointing to a stack address. Accessing this address later can lead to a kernel panic. Example access path: raid1_reshape() { // newpool is on the stack mempool_t newpool, oldpool; // initialize newpool.wait.head to stack address mempool_init(&newpool, ...); conf->r1bio_pool = newpool; } raid1_read_request() or raid1_write_request() { alloc_r1bio() { mempool_alloc() { // if pool->alloc fails remove_element() { --pool->curr_nr; } } } } mempool_free() { if (pool->curr_nr < pool->min_nr) { // pool->wait.head is a stack address // wake_up() will try to access this invalid address // which leads to a kernel panic return; wake_up(&pool->wait); } } Fix: reinit conf->r1bio_pool.wait after assigning newpool.

Scores

CVSS v3 7.1
EPSS 0.0003
EPSS Percentile 7.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Details

CWE
CWE-125
Status published
Products (10)
debian/debian_linux 11.0
linux/Kernel 4.18.0 - 5.4.296linux
linux/Kernel 5.11.0 - 5.15.189linux
linux/Kernel 5.16.0 - 6.1.146linux
linux/Kernel 5.5.0 - 5.10.240linux
linux/Kernel 6.13.0 - 6.15.7linux
linux/Kernel 6.2.0 - 6.6.99linux
linux/Kernel 6.7.0 - 6.12.39linux
linux/linux_kernel 6.16 rc1 (5 CPE variants)
linux/linux_kernel 4.18 - 5.4.296
Published Jul 25, 2025
Tracked Since Feb 18, 2026