CVE-2025-38445

Source
https://cve.org/CVERecord?id=CVE-2025-38445
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38445.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38445
Downstream
Related
Published
2025-07-25T15:27:28.035Z
Modified
2026-03-12T02:15:30.747852960Z
Summary
md/raid1: Fix stack memory use after return in raid1_reshape
Details

In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix stack memory use after return in raid1_reshape

In the raid1reshape function, newpool is allocated on the stack and assigned to conf->r1biopool. This results in conf->r1bio_pool.wait.head pointing to a stack address. Accessing this address later can lead to a kernel panic.

Example access path:

raid1reshape() { // newpool is on the stack mempoolt newpool, oldpool; // initialize newpool.wait.head to stack address mempoolinit(&newpool, ...); conf->r1biopool = newpool; }

raid1readrequest() or raid1writerequest() { allocr1bio() { mempoolalloc() { // if pool->alloc fails removeelement() { --pool->currnr; } } } }

mempoolfree() { if (pool->currnr < pool->minnr) { // pool->wait.head is a stack address // wakeup() will try to access this invalid address // which leads to a kernel panic return; wake_up(&pool->wait); } }

Fix: reinit conf->r1bio_pool.wait after assigning newpool.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38445.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
afeee514ce7f4cab605beedd03be71ebaf0c5fc8
Fixed
d8a6853d00fbaa810765c8ed2f452a5832273968
Fixed
12b00ec99624f8da8c325f2dd6e807df26df0025
Fixed
48da050b4f54ed639b66278d0ae6f4107b2c4e2d
Fixed
5f35e48b76655e45522df338876dfef88dafcc71
Fixed
df5894014a92ff0196dbc212a7764e97366fd2b7
Fixed
776e6186dc9ecbdb8a1b706e989166c8a99bbf64
Fixed
61fd5e93006cf82ec8ee5c115ab5cf4bbd104bdb
Fixed
d67ed2ccd2d1dcfda9292c0ea8697a9d0f2f0d98

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38445.json"