CVE-2025-38445

Source
https://cve.org/CVERecord?id=CVE-2025-38445
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38445.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38445
Downstream
Related
Published
2025-07-25T15:27:28.035Z
Modified
2026-05-18T05:59:30.901360987Z
Summary
md/raid1: Fix stack memory use after return in raid1_reshape
Details

In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix stack memory use after return in raid1_reshape

In the raid1reshape function, newpool is allocated on the stack and assigned to conf->r1biopool. This results in conf->r1bio_pool.wait.head pointing to a stack address. Accessing this address later can lead to a kernel panic.

Example access path:

raid1reshape() { // newpool is on the stack mempoolt newpool, oldpool; // initialize newpool.wait.head to stack address mempoolinit(&newpool, ...); conf->r1biopool = newpool; }

raid1readrequest() or raid1writerequest() { allocr1bio() { mempoolalloc() { // if pool->alloc fails removeelement() { --pool->currnr; } } } }

mempoolfree() { if (pool->currnr < pool->minnr) { // pool->wait.head is a stack address // wakeup() will try to access this invalid address // which leads to a kernel panic return; wake_up(&pool->wait); } }

Fix: reinit conf->r1bio_pool.wait after assigning newpool.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38445.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Fixed
d8a6853d00fbaa810765c8ed2f452a5832273968
Fixed
12b00ec99624f8da8c325f2dd6e807df26df0025
Fixed
48da050b4f54ed639b66278d0ae6f4107b2c4e2d
Fixed
5f35e48b76655e45522df338876dfef88dafcc71
Fixed
df5894014a92ff0196dbc212a7764e97366fd2b7
Fixed
776e6186dc9ecbdb8a1b706e989166c8a99bbf64
Fixed
61fd5e93006cf82ec8ee5c115ab5cf4bbd104bdb
Fixed
d67ed2ccd2d1dcfda9292c0ea8697a9d0f2f0d98

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38445.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.4.296
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.240
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.189
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.146
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.99
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.39
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38445.json"