In the Linux kernel, the following vulnerability has been resolved:
scsi: megaraid_sas: Fix invalid node index
On a system with DRAM interleave enabled, out-of-bound access is detected:
megaraidsas 0000:3f:00.0: requested/available msix 128/128 pollqueue 0 ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in ./arch/x86/include/asm/topology.h:72:28 index -1 is out of range for type 'cpumask *[1024]' dumpstacklvl+0x5d/0x80 ubsanepilogue+0x5/0x2b _ubsanhandleoutofbounds.cold+0x46/0x4b megasasallocirqvectors+0x149/0x190 [megaraidsas] megasasprobeone.cold+0xa4d/0x189c [megaraidsas] localpciprobe+0x42/0x90 pcideviceprobe+0xdc/0x290 reallyprobe+0xdb/0x340 _driverprobedevice+0x78/0x110 driverprobedevice+0x1f/0xa0 _driverattach+0xba/0x1c0 busforeachdev+0x8b/0xe0 busadddriver+0x142/0x220 driverregister+0x72/0xd0 megasasinit+0xdf/0xff0 [megaraidsas] dooneinitcall+0x57/0x310 doinitmodule+0x90/0x250 initmodulefromfile+0x85/0xc0 idempotentinitmodule+0x114/0x310 _x64sysfinitmodule+0x65/0xc0 dosyscall64+0x82/0x170 entrySYSCALL64afterhwframe+0x76/0x7e
Fix it accordingly.
[
{
"signature_type": "Function",
"digest": {
"function_hash": "312573225601470759611921749382291646211",
"length": 351.0
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c",
"function": "megasas_set_high_iops_queue_affinity_and_hint"
},
"signature_version": "v1",
"id": "CVE-2025-38239-09d2861b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19a47c966deb36624843b7301f0373a3dc541a05"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"278886082691567725846253981780400103455",
"61524935036526581001568134642632751698",
"301259212136561399312232509607158438165",
"80323347243080239985532715004852948237"
]
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c"
},
"signature_version": "v1",
"id": "CVE-2025-38239-7247bcea",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@074efb35552556a4b3b25eedab076d5dc24a8199"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "312573225601470759611921749382291646211",
"length": 351.0
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c",
"function": "megasas_set_high_iops_queue_affinity_and_hint"
},
"signature_version": "v1",
"id": "CVE-2025-38239-94aa01ec",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@074efb35552556a4b3b25eedab076d5dc24a8199"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "312573225601470759611921749382291646211",
"length": 351.0
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c",
"function": "megasas_set_high_iops_queue_affinity_and_hint"
},
"signature_version": "v1",
"id": "CVE-2025-38239-a05a22f5",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@752eb816b55adb0673727ba0ed96609a17895654"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "312573225601470759611921749382291646211",
"length": 351.0
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c",
"function": "megasas_set_high_iops_queue_affinity_and_hint"
},
"signature_version": "v1",
"id": "CVE-2025-38239-a1c746f7",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf2c1643abc3b2507d56bb6c22bf9897272f8a35"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "312573225601470759611921749382291646211",
"length": 351.0
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c",
"function": "megasas_set_high_iops_queue_affinity_and_hint"
},
"signature_version": "v1",
"id": "CVE-2025-38239-b0f40770",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1064b3532192e987ab17be7281d5fee36fd25e1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"278886082691567725846253981780400103455",
"61524935036526581001568134642632751698",
"301259212136561399312232509607158438165",
"80323347243080239985532715004852948237"
]
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c"
},
"signature_version": "v1",
"id": "CVE-2025-38239-bfc6ab2b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@752eb816b55adb0673727ba0ed96609a17895654"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"278886082691567725846253981780400103455",
"61524935036526581001568134642632751698",
"301259212136561399312232509607158438165",
"80323347243080239985532715004852948237"
]
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c"
},
"signature_version": "v1",
"id": "CVE-2025-38239-c446698e",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19a47c966deb36624843b7301f0373a3dc541a05"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"278886082691567725846253981780400103455",
"61524935036526581001568134642632751698",
"301259212136561399312232509607158438165",
"80323347243080239985532715004852948237"
]
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c"
},
"signature_version": "v1",
"id": "CVE-2025-38239-cd58911d",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bf2c1643abc3b2507d56bb6c22bf9897272f8a35"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"278886082691567725846253981780400103455",
"61524935036526581001568134642632751698",
"301259212136561399312232509607158438165",
"80323347243080239985532715004852948237"
]
},
"target": {
"file": "drivers/scsi/megaraid/megaraid_sas_base.c"
},
"signature_version": "v1",
"id": "CVE-2025-38239-f4c28af4",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f1064b3532192e987ab17be7281d5fee36fd25e1"
}
]