CVE-2026-23285

Source
https://cve.org/CVERecord?id=CVE-2026-23285
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23285.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23285
Downstream
Published
2026-03-25T10:26:44.698Z
Modified
2026-04-14T03:48:14.797441Z
Summary
drbd: fix null-pointer dereference on local read error
Details

In the Linux kernel, the following vulnerability has been resolved:

drbd: fix null-pointer dereference on local read error

In drbdrequestendio(), READCOMPLETEDWITH_ERROR is passed to __reqmod() with a NULL peerdevice:

_reqmod(req, what, NULL, &m);

The READCOMPLETEDWITHERROR handler then unconditionally passes this NULL peerdevice to drbdsetoutofsync(), which dereferences it, causing a null-pointer dereference.

Fix this by obtaining the peerdevice via firstpeerdevice(device), matching how drbdreq_destroy() handles the same situation.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23285.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0d11f3cf279c5ad20a41f29242f170ba3c02f2da
Fixed
6f1d1614f841d91a4169db65812ffd1271735b42
Fixed
1e906c08594c8f9a6a524f38ede2c4e051196106
Fixed
4e8935053ba389ae8d6685c10854d8021931bd89
Fixed
91df51d2df0ca4fd3281f73626341563d64a98a5
Fixed
0d195d3b205ca90db30d70d09d7bb6909aac178f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23285.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.4.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23285.json"