CVE-2025-38445
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's raid1_reshape function where a memory pool (newpool) is allocated on the stack and assigned to conf->r1bio_pool. This causes conf->r1bio_pool.wait.head to point to a stack address. Later, when the kernel tries to access this address (for example, during mempool_free and wake_up calls), it accesses an invalid stack address, which can lead to a kernel panic (system crash). The issue is due to using stack memory after the function returns, which is unsafe.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic, which means the Linux system could crash unexpectedly. This can lead to denial of service, data loss, or system instability, especially on systems using RAID1 configurations that trigger the affected code path.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the stack memory use after return in the raid1_reshape function by reinitializing conf->r1bio_pool.wait after assigning newpool. This prevents the kernel panic caused by accessing a stack address. Until patched, avoid using affected RAID1 reshape operations that could trigger this issue.