-

CVE-2025-68366

In the Linux kernel, the following vulnerability has been resolved:

nbd: defer config unlock in nbd_genl_connect

There is one use-after-free warning when running NBD_CMD_CONNECT and
NBD_CLEAR_SOCK:

nbd_genl_connect
  nbd_alloc_and_init_config // config_refs=1
  nbd_start_device // config_refs=2
  set NBD_RT_HAS_CONFIG_REF			open nbd // config_refs=3
  recv_work done // config_refs=2
						NBD_CLEAR_SOCK // config_refs=1
						close nbd // config_refs=0
  refcount_inc -> uaf

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290
 nbd_genl_connect+0x16d0/0x1ab0
 genl_family_rcv_msg_doit+0x1f3/0x310
 genl_rcv_msg+0x44a/0x790

The issue can be easily reproduced by adding a small delay before
refcount_inc(&nbd->config_refs) in nbd_genl_connect():

        mutex_unlock(&nbd->config_lock);
        if (!ret) {
                set_bit(NBD_RT_HAS_CONFIG_REF, &config->runtime_flags);
+               printk("before sleep\n");
+               mdelay(5 * 1000);
+               printk("after sleep\n");
                refcount_inc(&nbd->config_refs);
                nbd_connect_reply(info, nbd->index);
        }
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 330d688a5ca53857828081a3cf31b92ad1b0b3ed
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
Version < cd93db1b1b4460e6ee77564024ea461e5940f69c
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
Version < ae3e7bc1f4b393ae20e5c85583eb2c6977374716
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
Version < 2e5e0665a594f076ef2b9439447bae8be293d09d
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
Version < c9b99c948b4fb014812afe7b5ccf2db121d22e46
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
Version < 9a38306643874566d20f7aba7dff9e6f657b51a9
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
Version < c9e805f6a35d1dd189a9345595a5c20e87611942
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
Version < 1649714b930f9ea6233ce0810ba885999da3b5d4
Version e46c7287b1c27683a8e30ca825fb98e2b97f1099
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.12
Status affected
Version < 4.12
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.63
Status unaffected
Version <= 6.17.*
Version 6.17.13
Status unaffected
Version <= 6.18.*
Version 6.18.2
Status unaffected
Version <= *
Version 6.19-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.