CVE-2025-71225

MEDIUM

Linux Kernel - Privilege Escalation

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: md: suspend array while updating raid_disks via sysfs In raid1_reshape(), freeze_array() is called before modifying the r1bio memory pool (conf->r1bio_pool) and conf->raid_disks, and unfreeze_array() is called after the update is completed. However, freeze_array() only waits until nr_sync_pending and (nr_pending - nr_queued) of all buckets reaches zero. When an I/O error occurs, nr_queued is increased and the corresponding r1bio is queued to either retry_list or bio_end_io_list. As a result, freeze_array() may unblock before these r1bios are released. This can lead to a situation where conf->raid_disks and the mempool have already been updated while queued r1bios, allocated with the old raid_disks value, are later released. Consequently, free_r1bio() may access memory out of bounds in put_all_bios() and release r1bios of the wrong size to the new mempool, potentially causing issues with the mempool as well. Since only normal I/O might increase nr_queued while an I/O error occurs, suspending the array avoids this issue. Note: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends the array. Therefore, we suspend the array when updating raid_disks via sysfs to avoid this issue too.

Scores

CVSS v3 5.3
EPSS 0.0001
EPSS Percentile 2.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H

Details

CWE
CWE-367
Status published
Products (15)
linux/Kernel 3.10.0 - 6.12.70linux
linux/Kernel 6.13.0 - 6.18.10linux
Linux/Linux < 3.10
Linux/Linux 1b9203bb4c658c0242afa6fdb025c71d2fc3ad76
Linux/Linux 3.10
Linux/Linux 6.12.70 - 6.12.*
Linux/Linux 6.18.10 - 6.18.*
Linux/Linux 6.19
Linux/Linux 8ccf6cfb157419847f3cb2bfdfbcdbd39860e8e9
Linux/Linux e2d59925221cd562e07fee38ec8839f7209ae603 - 0107b18cd8ac17eb3e54786adc05a85cdbb6ef22
... and 5 more
Published Feb 18, 2026
Tracked Since Feb 18, 2026