CVE-2026-23285
Null Pointer Dereference in Linux DRBD Causes Read Errors
Publication date: 2026-03-25
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linbit | drbd | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause a null-pointer dereference in the Linux kernel, which typically results in a kernel crash or system instability. Such crashes can lead to denial of service conditions, where the affected system becomes unresponsive or requires a reboot.
Can you explain this vulnerability to me?
This vulnerability is a null-pointer dereference in the Linux kernel's DRBD component. Specifically, in the function drbd_request_endio(), a NULL peer_device pointer is passed to the __req_mod() function when handling a local read error. This NULL pointer is then passed to drbd_set_out_of_sync(), which dereferences it, causing the kernel to attempt to access memory through a NULL pointer, leading to a crash or instability.
The fix involves correctly obtaining the peer_device pointer using first_peer_device(device), ensuring that the pointer is valid before it is used, matching the handling in a related function drbd_req_destroy().