CVE-2025-38708
BaseFortify
Publication date: 2025-09-04
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 6.1.153 |
| linux | kernel | 5.10.244 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's DRBD component when 'two-primaries' mode is enabled. DRBD tries to handle concurrent writes to the same sector on both nodes to ensure data consistency. However, a missing reference count increment (kref_get) in handling write conflicts causes a premature destruction of a device object (drbd_destroy_device), leading to use-after-free errors and kernel crashes.
How can this vulnerability impact me? :
If triggered, this vulnerability can cause kernel crashes due to use-after-free errors in DRBD when concurrent writes occur in 'two-primaries' mode. However, in real-life scenarios, this code path is rarely taken because cluster file systems use distributed lock managers and virtualization environments prevent concurrent writes on both nodes. Therefore, the practical impact is limited mainly to test cases or misconfigured environments.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that you are not using DRBD with the 'two-primaries' feature enabled in scenarios that allow concurrent writes without proper distributed lock management. Avoid using DRBD as a random data generator or in test cases that trigger this code path. Upgrade to DRBD 9 or later, where write conflicts are handled differently by disconnecting hard instead of attempting to handle concurrent writes internally. Additionally, ensure that upper layers do not submit concurrent writes to DRBD.