๐Ÿ” CVE Alert

CVE-2025-21731

HIGH 7.8

nbd: don't allow reconnect after disconnect

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nbd: don't allow reconnect after disconnect Following process can cause nbd_config UAF: 1) grab nbd_config temporarily; 2) nbd_genl_disconnect() flush all recv_work() and release the initial reference: nbd_genl_disconnect nbd_disconnect_and_put nbd_disconnect flush_workqueue(nbd->recv_workq) if (test_and_clear_bit(NBD_RT_HAS_CONFIG_REF, ...)) nbd_config_put -> due to step 1), reference is still not zero 3) nbd_genl_reconfigure() queue recv_work() again; nbd_genl_reconfigure config = nbd_get_config_unlocked(nbd) if (!config) -> succeed if (!test_bit(NBD_RT_BOUND, ...)) -> succeed nbd_reconnect_socket queue_work(nbd->recv_workq, &args->work) 4) step 1) release the reference; 5) Finially, recv_work() will trigger UAF: recv_work nbd_config_put(nbd) -> nbd_config is freed atomic_dec(&config->recv_threads) -> UAF Fix the problem by clearing NBD_RT_BOUND in nbd_genl_disconnect(), so that nbd_genl_reconfigure() will fail.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
b7aa3d39385dc2d95899f9e379623fef446a2acd < e70a578487a47d7cf058904141e586684d1c3381 b7aa3d39385dc2d95899f9e379623fef446a2acd < 6bef6222a3f6c7adb6396f77f25a3579d821b09a b7aa3d39385dc2d95899f9e379623fef446a2acd < e3be8862d73cac833e0fb7602636c19c6cb94b11 b7aa3d39385dc2d95899f9e379623fef446a2acd < e7343fa33751cb07c1c56b666bf37cfca357130e b7aa3d39385dc2d95899f9e379623fef446a2acd < d208d2c52b652913b5eefc8ca434b0d6b757f68f b7aa3d39385dc2d95899f9e379623fef446a2acd < a8ee6ecde2b7bfb58c8a3afe8a9d2b848f580739 b7aa3d39385dc2d95899f9e379623fef446a2acd < 9793bd5ae4bdbdb2dde401a3cab94a6bfd05e302 b7aa3d39385dc2d95899f9e379623fef446a2acd < 844b8cdc681612ff24df62cdefddeab5772fadf1
Linux / Linux
4.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e70a578487a47d7cf058904141e586684d1c3381 git.kernel.org: https://git.kernel.org/stable/c/6bef6222a3f6c7adb6396f77f25a3579d821b09a git.kernel.org: https://git.kernel.org/stable/c/e3be8862d73cac833e0fb7602636c19c6cb94b11 git.kernel.org: https://git.kernel.org/stable/c/e7343fa33751cb07c1c56b666bf37cfca357130e git.kernel.org: https://git.kernel.org/stable/c/d208d2c52b652913b5eefc8ca434b0d6b757f68f git.kernel.org: https://git.kernel.org/stable/c/a8ee6ecde2b7bfb58c8a3afe8a9d2b848f580739 git.kernel.org: https://git.kernel.org/stable/c/9793bd5ae4bdbdb2dde401a3cab94a6bfd05e302 git.kernel.org: https://git.kernel.org/stable/c/844b8cdc681612ff24df62cdefddeab5772fadf1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html