CVE-2025-38708

Updated:

Description:

In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in handle_write_conflicts With `two-primaries` enabled, DRBD tries to detect "concurrent" writes and handle write conflicts, so that even if you write to the same sector simultaneously on both nodes, they end up with the identical data once the writes are completed. In handling "superseeded" writes, we forgot a kref_get, resulting in a premature drbd_destroy_device and use after free, and further to kernel crashes with symptoms. Relevance: No one should use DRBD as a random data generator, and apparently all users of "two-primaries" handle concurrent writes correctly on layer up. That is cluster file systems use some distributed lock manager, and live migration in virtualization environments stops writes on one node before starting writes on the other node. Which means that other than for "test cases", this code path is never taken in real life. FYI, in DRBD 9, things are handled differently nowadays. We still detect "write conflicts", but no longer try to be smart about them. We decided to disconnect hard instead: upper layers must not submit concurrent writes. If they do, that's their fault.

CVSS3: 5.5


Vendor State

OS Vendor version Errata
Oracle Linux 7 UEK 6 5.4.17-2136.348.3.el7uek ELSA-2025-20663
Oracle Linux 8 UEK 6 5.4.17-2136.348.3.el8uek ELSA-2025-20663
Debian 11 5.10.244-1 DLA-4327-1
Ubuntu 22.04 5.15.0-163.173 USN-7909-1
Ubuntu 22.04 AWS 5.15.0-1097.104 USN-7909-1
Debian 11 cloud 5.10.244-1 DLA-4327-1
Oracle Linux 9 UEK 7 5.15.0-314.193.5.3.el9uek ELSA-2025-25757
Oracle Linux 8 UEK 7 5.15.0-314.193.5.3.el8uek ELSA-2025-25757
Debian 12 6.1.153-1 DSA-6009-1

KernelCare State

OS Original kernel version State
Oracle Linux 7 UEK 6
In Progress
Oracle Linux 8 UEK 6
In Progress
Debian 11
Planned
Ubuntu 22.04
Planned
Ubuntu 22.04 AWS
Planned
Debian 11 cloud
Planned
Oracle Linux 9 UEK 7
Planned
Oracle Linux 8 UEK 7
Planned
Debian 12
Planned