CVE-2025-38443
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's NBD (Network Block Device) driver. When nbd_genl_connect() encounters certain errors after starting a device, it fails to properly stop the device, allowing freed memory to be accessed by recv_work threads. This affects Linux systems using NBD functionality.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic, system crash, or potential arbitrary code execution with kernel privileges leading to complete system compromise.
Likely Case
System instability, kernel panic, or denial of service causing affected NBD connections to fail.
If Mitigated
No impact if NBD functionality is disabled or the system is patched.
🎯 Exploit Status
Exploitation requires triggering specific error conditions in NBD connection setup. The vulnerability was discovered through syzkaller fuzzing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commit 002aca89753f666d878ca0eb8584c372684ac4ba and backported to stable branches
Vendor Advisory: https://git.kernel.org/stable/c/002aca89753f666d878ca0eb8584c372684ac4ba
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable NBD module
linuxPrevent loading of the NBD kernel module if not needed
echo 'blacklist nbd' > /etc/modprobe.d/blacklist-nbd.conf
rmmod nbd
Restrict NBD usage
linuxOnly allow trusted users to configure NBD devices
chmod 600 /dev/nbd*
setfacl -m u:trusteduser:rw /dev/nbd*
🧯 If You Can't Patch
- Disable NBD functionality entirely if not required
- Monitor systems for NBD-related crashes or unusual behavior
🔍 How to Verify
Check if Vulnerable:
Check if NBD module is loaded: lsmod | grep nbd. If loaded and kernel version is before fix, system may be vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes fix commit: uname -r and verify with distribution's security advisory.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN reports of use-after-free in nbd driver
- System logs showing NBD connection failures
Network Indicators:
- Unexpected NBD connection attempts from untrusted sources
SIEM Query:
source="kernel" AND ("nbd" OR "KASAN" OR "use-after-free")
🔗 References
- https://git.kernel.org/stable/c/002aca89753f666d878ca0eb8584c372684ac4ba
- https://git.kernel.org/stable/c/8586552df591e0a367eff44af0c586213eeecc3f
- https://git.kernel.org/stable/c/91fa560c73a8126868848ed6cd70607cbf8d87e2
- https://git.kernel.org/stable/c/aa9552438ebf015fc5f9f890dbfe39f0c53cf37e
- https://git.kernel.org/stable/c/cb121c47f364b51776c4db904a6a5a90ab0a7ec5
- https://git.kernel.org/stable/c/d46186eb7bbd9a11c145120f2d77effa8d4d44c2
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html