drbd: add missing kref_get in handle_write_conflicts
Summary
| CVE | CVE-2025-38708 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-09-04 16:15:39 UTC |
| Updated | 2026-05-12 13:17:01 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in handle_write_conflicts With `two-primaries` enabled, DRBD tries to detect "concurrent" writes and handle write conflicts, so that even if you write to the same sector simultaneously on both nodes, they end up with the identical data once the writes are completed. In handling "superseeded" writes, we forgot a kref_get, resulting in a premature drbd_destroy_device and use after free, and further to kernel crashes with symptoms. Relevance: No one should use DRBD as a random data generator, and apparently all users of "two-primaries" handle concurrent writes correctly on layer up. That is cluster file systems use some distributed lock manager, and live migration in virtualization environments stops writes on one node before starting writes on the other node. Which means that other than for "test cases", this code path is never taken in real life. FYI, in DRBD 9, things are handled differently nowadays. We still detect "write conflicts", but no longer try to be smart about them. We decided to disconnect hard instead: upper layers must not submit concurrent writes. If they do, that's their fault. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-416
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 0336bfe9c237476bd7c45605a36ca79c2bca62e5 git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 810cd546a29bfac90ed1328ea01d693d4bd11cb1 git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 84ef8dd3238330d1795745ece83b19f0295751bf git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 57418de35420cedab035aa1da8a26c0499b7f575 git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 9f53b2433ad248cd3342cc345f56f5c7904bd8c4 git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 7d483ad300fc0a06f69b019dda8f74970714baf8 git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89 git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 3a896498f6f577e57bf26aaa93b48c22b6d20c20 git | Not specified |
| CNA | Linux | Linux | affected 668700b40a7c8727bbd2b3fd4fd22e0ce3f1aeb6 00c9c9628b49e368d140cfa61d7df9b8922ec2a8 git | Not specified |
| CNA | Linux | Linux | affected 4.5 | Not specified |
| CNA | Linux | Linux | unaffected 4.5 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.4.297 5.4.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.241 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.190 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.149 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.103 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.43 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.15.11 6.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.16.2 6.16.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.17 * original_commit_for_fix | Not specified |
| ADP | Siemens | SIMATIC CN 4100 | affected V5.0 custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
| ADP | Siemens | SIPLUS S7-1500 CPU 1518-4 PN/DP MFP | affected V3.1.5 * custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/0336bfe9c237476bd7c45605a36ca79c2bca62e5 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/810cd546a29bfac90ed1328ea01d693d4bd11cb1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| lists.debian.org/debian-lts-announce/2025/10/msg00008.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | Mailing List, Third Party Advisory |
| cert-portal.siemens.com/productcert/html/ssa-082556.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| git.kernel.org/stable/c/7d483ad300fc0a06f69b019dda8f74970714baf8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/00c9c9628b49e368d140cfa61d7df9b8922ec2a8 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/57418de35420cedab035aa1da8a26c0499b7f575 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| cert-portal.siemens.com/productcert/html/ssa-032379.html | 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | cert-portal.siemens.com | |
| git.kernel.org/stable/c/3a896498f6f577e57bf26aaa93b48c22b6d20c20 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/9f53b2433ad248cd3342cc345f56f5c7904bd8c4 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/84ef8dd3238330d1795745ece83b19f0295751bf | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| lists.debian.org/debian-lts-announce/2025/10/msg00007.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.