Linux Kernel md/raid5 NPD via raid5_store_group_thread_cnt()
CVE-2025-71135 Published on January 14, 2026
md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()
In the Linux kernel, the following vulnerability has been resolved:
md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()
The variable mddev->private is first assigned to conf and then checked:
conf = mddev->private;
if (!conf) ...
If conf is NULL, then mddev->private is also NULL. In this case,
null-pointer dereferences can occur when calling raid5_quiesce():
raid5_quiesce(mddev, true);
raid5_quiesce(mddev, false);
since mddev->private is assigned to conf again in raid5_quiesce(), and conf
is dereferenced in several places, for example:
conf->quiesce = 0;
wake_up(&conf->wait_for_quiescent);
To fix this issue, the function should unlock mddev and return before
invoking raid5_quiesce() when conf is NULL, following the existing pattern
in raid5_change_consistency_policy().
Products Associated with CVE-2025-71135
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version be19e6e4339d1579d5f2fae8ce4facf9521dbbfc and below 20597b7229aea8b5bc45cd92097640257c7fc33b is affected.
- Version fa1944bbe6220eb929e2c02e5e8706b908565711 and below e5abb6af905de6b2fead8a0b3f32ab0b81468a01 is affected.
- Version fa1944bbe6220eb929e2c02e5e8706b908565711 and below 7ad6ef91d8745d04aff9cce7bdbc6320d8e05fe9 is affected.
- Version 6.13 is affected.
- Before 6.13 is unaffected.
- Version 6.12.64, <= 6.12.* is unaffected.
- Version 6.18.4, <= 6.18.* is unaffected.
- Version 6.19, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.