CVE-2025-38445

7.1 HIGH

📋 TL;DR

A use-after-return vulnerability in the Linux kernel's RAID1 subsystem allows accessing stack memory after it has been freed. This can lead to kernel panics and system crashes. Affects systems using Linux kernel RAID1 (mirroring) with specific versions.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific kernel versions with the vulnerable commit; check git references for exact ranges.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only affects systems using RAID1 (mirroring) with reshape operations. Not all RAID1 configurations are vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, denial of service, and potential data corruption in RAID arrays.

🟠

Likely Case

System crash or instability when RAID1 operations trigger the vulnerable code path during reshape operations.

🟢

If Mitigated

No impact if the vulnerable code path is not triggered during normal operations.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific RAID operations.
🏢 Internal Only: MEDIUM - Local users or processes with RAID access could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific RAID1 reshape operations. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with fixes from git references: 12b00ec99624f8da8c325f2dd6e807df26df0025 and related commits.

Vendor Advisory: https://git.kernel.org/stable/c/12b00ec99624f8da8c325f2dd6e807df26df0025

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from distribution vendor. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid RAID1 reshape operations

linux

Prevent triggering the vulnerable code path by avoiding RAID1 reshape operations.

# Monitor and avoid mdadm --grow or reshape commands on RAID1 arrays

🧯 If You Can't Patch

  • Monitor RAID1 arrays and avoid reshape operations.
  • Implement strict access controls to prevent unauthorized RAID management.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if RAID1 is in use: uname -r and cat /proc/mdstat

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to include the fix commits.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs, RAID reshape operation logs in /var/log/messages or dmesg

Network Indicators:

  • None - local vulnerability

SIEM Query:

Search for kernel panic events or RAID reshape operations in system logs.

🔗 References

📤 Share & Export