CVE-2025-38708

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38708
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38708.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38708
Downstream
Related
Published
2025-09-04T15:32:59.108Z
Modified
2025-11-28T02:35:41.924329Z
Summary
drbd: add missing kref_get in handle_write_conflicts
Details

In the Linux kernel, the following vulnerability has been resolved:

drbd: add missing krefget in handlewrite_conflicts

With two-primaries enabled, DRBD tries to detect "concurrent" writes and handle write conflicts, so that even if you write to the same sector simultaneously on both nodes, they end up with the identical data once the writes are completed.

In handling "superseeded" writes, we forgot a krefget, resulting in a premature drbddestroy_device and use after free, and further to kernel crashes with symptoms.

Relevance: No one should use DRBD as a random data generator, and apparently all users of "two-primaries" handle concurrent writes correctly on layer up. That is cluster file systems use some distributed lock manager, and live migration in virtualization environments stops writes on one node before starting writes on the other node.

Which means that other than for "test cases", this code path is never taken in real life.

FYI, in DRBD 9, things are handled differently nowadays. We still detect "write conflicts", but no longer try to be smart about them. We decided to disconnect hard instead: upper layers must not submit concurrent writes. If they do, that's their fault.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38708.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
0336bfe9c237476bd7c45605a36ca79c2bca62e5
Fixed
810cd546a29bfac90ed1328ea01d693d4bd11cb1
Fixed
84ef8dd3238330d1795745ece83b19f0295751bf
Fixed
57418de35420cedab035aa1da8a26c0499b7f575
Fixed
9f53b2433ad248cd3342cc345f56f5c7904bd8c4
Fixed
7d483ad300fc0a06f69b019dda8f74970714baf8
Fixed
46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89
Fixed
3a896498f6f577e57bf26aaa93b48c22b6d20c20
Fixed
00c9c9628b49e368d140cfa61d7df9b8922ec2a8

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.297
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.241
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.190
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.149
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.103
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.43
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.11
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.2