{"id":"CVE-2025-38451","summary":"md/md-bitmap: fix GPF in bitmap_get_stats()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmd/md-bitmap: fix GPF in bitmap_get_stats()\n\nThe commit message of commit 6ec1f0239485 (\"md/md-bitmap: fix stats\ncollection for external bitmaps\") states:\n\n    Remove the external bitmap check as the statistics should be\n    available regardless of bitmap storage location.\n\n    Return -EINVAL only for invalid bitmap with no storage (neither in\n    superblock nor in external file).\n\nBut, the code does not adhere to the above, as it does only check for\na valid super-block for \"internal\" bitmaps. Hence, we observe:\n\nOops: GPF, probably for non-canonical address 0x1cd66f1f40000028\nRIP: 0010:bitmap_get_stats+0x45/0xd0\nCall Trace:\n\n seq_read_iter+0x2b9/0x46a\n seq_read+0x12f/0x180\n proc_reg_read+0x57/0xb0\n vfs_read+0xf6/0x380\n ksys_read+0x6d/0xf0\n do_syscall_64+0x8c/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nWe fix this by checking the existence of a super-block for both the\ninternal and external case.","modified":"2026-04-15T23:59:23.293989244Z","published":"2025-07-25T15:27:32.045Z","related":["SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38451.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3d82a729530bd2110ba66e4a1f73461c776edec2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3e0542701b37aa25b025d8531583458e4f014c2e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a18f9b08c70e10ea3a897058fee8a4f3b4c146ec"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a23b16ba3274961494f5ad236345d238364349ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c17fb542dbd1db745c9feac15617056506dd7195"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38451.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38451"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"065f4b1cd41d03702426af44193894b925607073"},{"fixed":"a23b16ba3274961494f5ad236345d238364349ff"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0b5390aeaa85eb2f15e0e2ea0731c0995285db5e"},{"fixed":"3d82a729530bd2110ba66e4a1f73461c776edec2"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"eeeba7f43ae27835718a5f5ad6552a8983e75201"},{"fixed":"3e0542701b37aa25b025d8531583458e4f014c2e"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6ec1f0239485028445d213d91cfee5242f3211ba"},{"fixed":"a18f9b08c70e10ea3a897058fee8a4f3b4c146ec"},{"fixed":"c17fb542dbd1db745c9feac15617056506dd7195"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"896a6fbefc9050cf940ed57947eda6dc23aa58b0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38451.json"}}],"schema_version":"1.7.5"}