U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-38708 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in handle_write_conflicts With `two-primaries` enabled, DRBD tries to detect "concurrent" writes and handle write conflicts, so that even if you write to the same sector simultaneously on both nodes, they end up with the identical data once the writes are completed. In handling "superseeded" writes, we forgot a kref_get, resulting in a premature drbd_destroy_device and use after free, and further to kernel crashes with symptoms. Relevance: No one should use DRBD as a random data generator, and apparently all users of "two-primaries" handle concurrent writes correctly on layer up. That is cluster file systems use some distributed lock manager, and live migration in virtualization environments stops writes on one node before starting writes on the other node. Which means that other than for "test cases", this code path is never taken in real life. FYI, in DRBD 9, things are handled differently nowadays. We still detect "write conflicts", but no longer try to be smart about them. We decided to disconnect hard instead: upper layers must not submit concurrent writes. If they do, that's their fault.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/00c9c9628b49e368d140cfa61d7df9b8922ec2a8 kernel.org
https://git.kernel.org/stable/c/0336bfe9c237476bd7c45605a36ca79c2bca62e5 kernel.org
https://git.kernel.org/stable/c/3a896498f6f577e57bf26aaa93b48c22b6d20c20 kernel.org
https://git.kernel.org/stable/c/46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89 kernel.org
https://git.kernel.org/stable/c/57418de35420cedab035aa1da8a26c0499b7f575 kernel.org
https://git.kernel.org/stable/c/7d483ad300fc0a06f69b019dda8f74970714baf8 kernel.org
https://git.kernel.org/stable/c/810cd546a29bfac90ed1328ea01d693d4bd11cb1 kernel.org
https://git.kernel.org/stable/c/84ef8dd3238330d1795745ece83b19f0295751bf kernel.org
https://git.kernel.org/stable/c/9f53b2433ad248cd3342cc345f56f5c7904bd8c4 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-38708
NVD Published Date:
09/04/2025
NVD Last Modified:
09/05/2025
Source:
kernel.org