CVE-2025-38451:
A vulnerability in the Linux kernel's bitmap statistics collection can lead to a general protection fault (GPF) due to improper checks for bitmap storage locations.
Score
A numerical rating that indicates how dangerous this vulnerability is.
5.5MediumA numerical rating that indicates how dangerous this vulnerability is.
- Published Date:Jul 25, 2025
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.0
- EPSS Percentile:5%
Exploitability
- Score:1.8
- Attack Vector:LOCAL
- Attack Complexity:LOW
- Privileges Required:LOW
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:3.6
- Confidentiality Impact:NONE
- Integrity Impact:NONE
- Availability Impact:HIGH
Description Preview
A vulnerability in the Linux kernel's bitmap statistics collection can lead to a general protection fault (GPF) due to improper checks for bitmap storage locations.
Overview
- **CVE ID**: CVE-2025-38451 - **Published Date**: July 25, 2025 - **Vulnerability Status**: Received - **Affected Component**: Linux kernel (specifically the `md/md-bitmap` module) - **Impact**: Potential system crashes or instability due to general protection faults when accessing bitmap statistics.
Remediation
- To remediate this vulnerability, users should update their Linux kernel to a version that includes the fix for the `bitmap_get_stats()` function. The fix ensures that the existence of a super-block is validated for both internal and external bitmap storage locations, preventing the occurrence of general protection faults. Users are encouraged to monitor kernel updates from their respective distributions and apply patches as soon as they are available.
References
- 1. [Commit 1: Fix for bitmap statistics collection](https://git.kernel.org/stable/c/3d82a729530bd2110ba66e4a1f73461c776edec2)
- 2. [Commit 2: Related changes in bitmap handling](https://git.kernel.org/stable/c/3e0542701b37aa25b025d8531583458e4f014c2e)
- 3. [Commit 3: Additional improvements](https://git.kernel.org/stable/c/a18f9b08c70e10ea3a897058fee8a4f3b4c146ec)
- 4. [Commit 4: Further enhancements](https://git.kernel.org/stable/c/a23b16ba3274961494f5ad236345d238364349ff)
- 5. [Commit 5: Related fixes](https://git.kernel.org/stable/c/c17fb542dbd1db745c9feac15617056506dd7195)
- This structured information should provide a clear understanding of the vulnerability and the necessary steps for remediation.
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.
Medium
Low