Fixed
Created: Jul 28, 2025
Updated: Aug 10, 2025
Resolved Date: Aug 10, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]raid10: cleanup memleak at raid10_make_request[EOL][EOL]If raid10_read_request or raid10_write_request registers a new[EOL]request and the REQ_NOWAIT flag is set, the code does not[EOL]free the malloc from the mempool.[EOL][EOL]unreferenced object 0xffff8884802c3200 (size 192):[EOL] comm "fio", pid 9197, jiffies 4298078271[EOL] hex dump (first 32 bytes):[EOL] 00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00 .........A......[EOL] 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................[EOL] backtrace (crc c1a049a2):[EOL] __kmalloc+0x2bb/0x450[EOL] mempool_alloc+0x11b/0x320[EOL] raid10_make_request+0x19e/0x650 [raid10][EOL] md_handle_request+0x3b3/0x9e0[EOL] __submit_bio+0x394/0x560[EOL] __submit_bio_noacct+0x145/0x530[EOL] submit_bio_noacct_nocheck+0x682/0x830[EOL] __blkdev_direct_IO_async+0x4dc/0x6b0[EOL] blkdev_read_iter+0x1e5/0x3b0[EOL] __io_read+0x230/0x1110[EOL] io_read+0x13/0x30[EOL] io_issue_sqe+0x134/0x1180[EOL] io_submit_sqes+0x48c/0xe90[EOL] __do_sys_io_uring_enter+0x574/0x8b0[EOL] do_syscall_64+0x5c/0xe0[EOL] entry_SYSCALL_64_after_hwframe+0x76/0x7e[EOL][EOL]V4: changing backing tree to see if CKI tests will pass.[EOL]The patch code has not changed between any versions.
CREATE(Triage):(User=admin) [CVE-2025-38444 (https://nvd.nist.gov/vuln/detail/CVE-2025-38444)