In the Linux kernel, the following vulnerability has been resolved:
raid10: cleanup memleak at raid10makerequest
If raid10readrequest or raid10writerequest registers a new request and the REQ_NOWAIT flag is set, the code does not free the malloc from the mempool.
unreferenced object 0xffff8884802c3200 (size 192): comm "fio", pid 9197, jiffies 4298078271 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00 .........A...... 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc c1a049a2): __kmalloc+0x2bb/0x450 mempoolalloc+0x11b/0x320 raid10make_request+0x19e/0x650 [raid10] mdhandlerequest+0x3b3/0x9e0 __submit_bio+0x394/0x560 __submitbionoacct+0x145/0x530 submitbionoacct_nocheck+0x682/0x830 __blkdevdirectIO_async+0x4dc/0x6b0 blkdevreaditer+0x1e5/0x3b0 __ioread+0x230/0x1110 ioread+0x13/0x30 ioissuesqe+0x134/0x1180 iosubmitsqes+0x48c/0xe90 __dosysiouringenter+0x574/0x8b0 dosyscall64+0x5c/0xe0 entrySYSCALL64afterhwframe+0x76/0x7e
V4: changing backing tree to see if CKI tests will pass. The patch code has not changed between any versions.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38444.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38444.json"
[
{
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed7bcd9f617e4107ac0813c516e72e6b8f6029bd",
"id": "CVE-2025-38444-408fee4d",
"deprecated": false,
"target": {
"file": "drivers/md/raid10.c"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"264917429078444769091581808338246150759",
"157696221918068328938834363552123612962",
"86498198731632929990325152483157880805",
"156962890239959111010402058539500011315",
"204806388072347110203338744738484418289",
"13438369834287535183494289286559461723",
"148918814461366435052011339133632373856",
"202967913582826486053252058986667240761",
"323872341104289172082576053872573557218",
"280679546501866669222817655130722450329"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed7bcd9f617e4107ac0813c516e72e6b8f6029bd",
"id": "CVE-2025-38444-575aaa46",
"deprecated": false,
"target": {
"function": "raid10_read_request",
"file": "drivers/md/raid10.c"
},
"signature_version": "v1",
"digest": {
"length": 2176.0,
"function_hash": "212756466945866456641179695770786128260"
}
},
{
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ed7bcd9f617e4107ac0813c516e72e6b8f6029bd",
"id": "CVE-2025-38444-a18daa0d",
"deprecated": false,
"target": {
"function": "raid10_write_request",
"file": "drivers/md/raid10.c"
},
"signature_version": "v1",
"digest": {
"length": 3987.0,
"function_hash": "307176758717861254975508170907805397142"
}
}
]