Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-71135
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-14 Jan, 2026 | 15:07
Updated At-11 May, 2026 | 21:55
Rejected At-
▼CVE Numbering Authority (CNA)
md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()

In the Linux kernel, the following vulnerability has been resolved: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() The variable mddev->private is first assigned to conf and then checked: conf = mddev->private; if (!conf) ... If conf is NULL, then mddev->private is also NULL. In this case, null-pointer dereferences can occur when calling raid5_quiesce(): raid5_quiesce(mddev, true); raid5_quiesce(mddev, false); since mddev->private is assigned to conf again in raid5_quiesce(), and conf is dereferenced in several places, for example: conf->quiesce = 0; wake_up(&conf->wait_for_quiescent); To fix this issue, the function should unlock mddev and return before invoking raid5_quiesce() when conf is NULL, following the existing pattern in raid5_change_consistency_policy().

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/raid5.c
Default Status
unaffected
Versions
Affected
  • From be19e6e4339d1579d5f2fae8ce4facf9521dbbfc before 20597b7229aea8b5bc45cd92097640257c7fc33b (git)
  • From fa1944bbe6220eb929e2c02e5e8706b908565711 before e5abb6af905de6b2fead8a0b3f32ab0b81468a01 (git)
  • From fa1944bbe6220eb929e2c02e5e8706b908565711 before 7ad6ef91d8745d04aff9cce7bdbc6320d8e05fe9 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/md/raid5.c
Default Status
affected
Versions
Affected
  • 6.13
Unaffected
  • From 0 before 6.13 (semver)
  • From 6.12.64 through 6.12.* (semver)
  • From 6.18.4 through 6.18.* (semver)
  • From 6.19 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/20597b7229aea8b5bc45cd92097640257c7fc33b
N/A
https://git.kernel.org/stable/c/e5abb6af905de6b2fead8a0b3f32ab0b81468a01
N/A
https://git.kernel.org/stable/c/7ad6ef91d8745d04aff9cce7bdbc6320d8e05fe9
N/A
Hyperlink: https://git.kernel.org/stable/c/20597b7229aea8b5bc45cd92097640257c7fc33b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e5abb6af905de6b2fead8a0b3f32ab0b81468a01
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7ad6ef91d8745d04aff9cce7bdbc6320d8e05fe9
Resource: N/A
Details not found