CVE-2026-23285
Received Received - Intake
Null Pointer Dereference in Linux DRBD Causes Read Errors

Publication date: 2026-03-25

Last updated on: 2026-03-25

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: drbd: fix null-pointer dereference on local read error In drbd_request_endio(), READ_COMPLETED_WITH_ERROR is passed to __req_mod() with a NULL peer_device: __req_mod(req, what, NULL, &m); The READ_COMPLETED_WITH_ERROR handler then unconditionally passes this NULL peer_device to drbd_set_out_of_sync(), which dereferences it, causing a null-pointer dereference. Fix this by obtaining the peer_device via first_peer_device(device), matching how drbd_req_destroy() handles the same situation.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linbit drbd *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can cause a null-pointer dereference in the Linux kernel, which typically results in a kernel crash or system instability. Such crashes can lead to denial of service conditions, where the affected system becomes unresponsive or requires a reboot.


Can you explain this vulnerability to me?

This vulnerability is a null-pointer dereference in the Linux kernel's DRBD component. Specifically, in the function drbd_request_endio(), a NULL peer_device pointer is passed to the __req_mod() function when handling a local read error. This NULL pointer is then passed to drbd_set_out_of_sync(), which dereferences it, causing the kernel to attempt to access memory through a NULL pointer, leading to a crash or instability.

The fix involves correctly obtaining the peer_device pointer using first_peer_device(device), ensuring that the pointer is valid before it is used, matching the handling in a related function drbd_req_destroy().


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart