-

CVE-2025-38708

In the Linux kernel, the following vulnerability has been resolved:

drbd: add missing kref_get in handle_write_conflicts

With `two-primaries` enabled, DRBD tries to detect "concurrent" writes
and handle write conflicts, so that even if you write to the same sector
simultaneously on both nodes, they end up with the identical data once
the writes are completed.

In handling "superseeded" writes, we forgot a kref_get,
resulting in a premature drbd_destroy_device and use after free,
and further to kernel crashes with symptoms.

Relevance: No one should use DRBD as a random data generator, and apparently
all users of "two-primaries" handle concurrent writes correctly on layer up.
That is cluster file systems use some distributed lock manager,
and live migration in virtualization environments stops writes on one node
before starting writes on the other node.

Which means that other than for "test cases",
this code path is never taken in real life.

FYI, in DRBD 9, things are handled differently nowadays.  We still detect
"write conflicts", but no longer try to be smart about them.
We decided to disconnect hard instead: upper layers must not submit concurrent
writes. If they do, that's their fault.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 0336bfe9c237476bd7c45605a36ca79c2bca62e5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 810cd546a29bfac90ed1328ea01d693d4bd11cb1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 84ef8dd3238330d1795745ece83b19f0295751bf
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 57418de35420cedab035aa1da8a26c0499b7f575
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9f53b2433ad248cd3342cc345f56f5c7904bd8c4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7d483ad300fc0a06f69b019dda8f74970714baf8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 3a896498f6f577e57bf26aaa93b48c22b6d20c20
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 00c9c9628b49e368d140cfa61d7df9b8922ec2a8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.149
Status unaffected
Version <= 6.6.*
Version 6.6.103
Status unaffected
Version <= 6.12.*
Version 6.12.43
Status unaffected
Version <= 6.15.*
Version 6.15.11
Status unaffected
Version <= 6.16.*
Version 6.16.2
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.249
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String