CVE-2026-23286 (GCVE-0-2026-23286)
Vulnerability from cvelistv5 – Published: 2026-03-25 10:26 – Updated: 2026-04-18 08:57
VLAI?
Title
atm: lec: fix null-ptr-deref in lec_arp_clear_vccs
Summary
In the Linux kernel, the following vulnerability has been resolved:
atm: lec: fix null-ptr-deref in lec_arp_clear_vccs
syzkaller reported a null-ptr-deref in lec_arp_clear_vccs().
This issue can be easily reproduced using the syzkaller reproducer.
In the ATM LANE (LAN Emulation) module, the same atm_vcc can be shared by
multiple lec_arp_table entries (e.g., via entry->vcc or entry->recv_vcc).
When the underlying VCC is closed, lec_vcc_close() iterates over all
ARP entries and calls lec_arp_clear_vccs() for each matched entry.
For example, when lec_vcc_close() iterates through the hlists in
priv->lec_arp_empty_ones or other ARP tables:
1. In the first iteration, for the first matched ARP entry sharing the VCC,
lec_arp_clear_vccs() frees the associated vpriv (which is vcc->user_back)
and sets vcc->user_back to NULL.
2. In the second iteration, for the next matched ARP entry sharing the same
VCC, lec_arp_clear_vccs() is called again. It obtains a NULL vpriv from
vcc->user_back (via LEC_VCC_PRIV(vcc)) and then attempts to dereference it
via `vcc->pop = vpriv->old_pop`, leading to a null-ptr-deref crash.
Fix this by adding a null check for vpriv before dereferencing
it. If vpriv is already NULL, it means the VCC has been cleared
by a previous call, so we can safely skip the cleanup and just
clear the entry's vcc/recv_vcc pointers.
The entire cleanup block (including vcc_release_async()) is placed inside
the vpriv guard because a NULL vpriv indicates the VCC has already been
fully released by a prior iteration — repeating the teardown would
redundantly set flags and trigger callbacks on an already-closing socket.
The Fixes tag points to the initial commit because the entry->vcc path has
been vulnerable since the original code. The entry->recv_vcc path was later
added by commit 8d9f73c0ad2f ("atm: fix a memory leak of vcc->user_back")
with the same pattern, and both paths are fixed here.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < 8aff65a82b6389ec674d46e5b3d3ae6f07db5e3e
(git)
Affected: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < 30c9744a989feb22cfbb84170eb0e038a7a2c1da (git) Affected: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < e9665986eb127290ceb535bd5d04d7a84265d94f (git) Affected: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < 622062f24644b4536d3f437e0cf7a8c4bb421665 (git) Affected: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < 2d9f57ea29a1f1772373b98a509b44d49fda609e (git) Affected: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < 7ea92ab075d809ec8a96669a5ecf00f752057875 (git) Affected: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < 5f1cfea7921f5c126a441d973690eeba52677b64 (git) Affected: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 , < 101bacb303e89dc2e0640ae6a5e0fb97c4eb45bb (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/atm/lec.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "8aff65a82b6389ec674d46e5b3d3ae6f07db5e3e",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
},
{
"lessThan": "30c9744a989feb22cfbb84170eb0e038a7a2c1da",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
},
{
"lessThan": "e9665986eb127290ceb535bd5d04d7a84265d94f",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
},
{
"lessThan": "622062f24644b4536d3f437e0cf7a8c4bb421665",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
},
{
"lessThan": "2d9f57ea29a1f1772373b98a509b44d49fda609e",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
},
{
"lessThan": "7ea92ab075d809ec8a96669a5ecf00f752057875",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
},
{
"lessThan": "5f1cfea7921f5c126a441d973690eeba52677b64",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
},
{
"lessThan": "101bacb303e89dc2e0640ae6a5e0fb97c4eb45bb",
"status": "affected",
"version": "1da177e4c3f41524e886b7f1b8a0c1fc7321cac2",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/atm/lec.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "2.6.12"
},
{
"lessThan": "2.6.12",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.253",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.203",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.167",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.130",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.77",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.17",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.253",
"versionStartIncluding": "2.6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.203",
"versionStartIncluding": "2.6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.167",
"versionStartIncluding": "2.6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.130",
"versionStartIncluding": "2.6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.77",
"versionStartIncluding": "2.6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.17",
"versionStartIncluding": "2.6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.7",
"versionStartIncluding": "2.6.12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "2.6.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: lec: fix null-ptr-deref in lec_arp_clear_vccs\n\nsyzkaller reported a null-ptr-deref in lec_arp_clear_vccs().\nThis issue can be easily reproduced using the syzkaller reproducer.\n\nIn the ATM LANE (LAN Emulation) module, the same atm_vcc can be shared by\nmultiple lec_arp_table entries (e.g., via entry-\u003evcc or entry-\u003erecv_vcc).\nWhen the underlying VCC is closed, lec_vcc_close() iterates over all\nARP entries and calls lec_arp_clear_vccs() for each matched entry.\n\nFor example, when lec_vcc_close() iterates through the hlists in\npriv-\u003elec_arp_empty_ones or other ARP tables:\n\n1. In the first iteration, for the first matched ARP entry sharing the VCC,\nlec_arp_clear_vccs() frees the associated vpriv (which is vcc-\u003euser_back)\nand sets vcc-\u003euser_back to NULL.\n2. In the second iteration, for the next matched ARP entry sharing the same\nVCC, lec_arp_clear_vccs() is called again. It obtains a NULL vpriv from\nvcc-\u003euser_back (via LEC_VCC_PRIV(vcc)) and then attempts to dereference it\nvia `vcc-\u003epop = vpriv-\u003eold_pop`, leading to a null-ptr-deref crash.\n\nFix this by adding a null check for vpriv before dereferencing\nit. If vpriv is already NULL, it means the VCC has been cleared\nby a previous call, so we can safely skip the cleanup and just\nclear the entry\u0027s vcc/recv_vcc pointers.\n\nThe entire cleanup block (including vcc_release_async()) is placed inside\nthe vpriv guard because a NULL vpriv indicates the VCC has already been\nfully released by a prior iteration \u2014 repeating the teardown would\nredundantly set flags and trigger callbacks on an already-closing socket.\n\nThe Fixes tag points to the initial commit because the entry-\u003evcc path has\nbeen vulnerable since the original code. The entry-\u003erecv_vcc path was later\nadded by commit 8d9f73c0ad2f (\"atm: fix a memory leak of vcc-\u003euser_back\")\nwith the same pattern, and both paths are fixed here."
}
],
"providerMetadata": {
"dateUpdated": "2026-04-18T08:57:38.115Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/8aff65a82b6389ec674d46e5b3d3ae6f07db5e3e"
},
{
"url": "https://git.kernel.org/stable/c/30c9744a989feb22cfbb84170eb0e038a7a2c1da"
},
{
"url": "https://git.kernel.org/stable/c/e9665986eb127290ceb535bd5d04d7a84265d94f"
},
{
"url": "https://git.kernel.org/stable/c/622062f24644b4536d3f437e0cf7a8c4bb421665"
},
{
"url": "https://git.kernel.org/stable/c/2d9f57ea29a1f1772373b98a509b44d49fda609e"
},
{
"url": "https://git.kernel.org/stable/c/7ea92ab075d809ec8a96669a5ecf00f752057875"
},
{
"url": "https://git.kernel.org/stable/c/5f1cfea7921f5c126a441d973690eeba52677b64"
},
{
"url": "https://git.kernel.org/stable/c/101bacb303e89dc2e0640ae6a5e0fb97c4eb45bb"
}
],
"title": "atm: lec: fix null-ptr-deref in lec_arp_clear_vccs",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23286",
"datePublished": "2026-03-25T10:26:45.531Z",
"dateReserved": "2026-01-13T15:37:45.992Z",
"dateUpdated": "2026-04-18T08:57:38.115Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-23286",
"date": "2026-04-24",
"epss": "0.00032",
"percentile": "0.09294"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23286\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-03-25T11:16:23.393\",\"lastModified\":\"2026-04-18T09:16:16.523\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\natm: lec: fix null-ptr-deref in lec_arp_clear_vccs\\n\\nsyzkaller reported a null-ptr-deref in lec_arp_clear_vccs().\\nThis issue can be easily reproduced using the syzkaller reproducer.\\n\\nIn the ATM LANE (LAN Emulation) module, the same atm_vcc can be shared by\\nmultiple lec_arp_table entries (e.g., via entry-\u003evcc or entry-\u003erecv_vcc).\\nWhen the underlying VCC is closed, lec_vcc_close() iterates over all\\nARP entries and calls lec_arp_clear_vccs() for each matched entry.\\n\\nFor example, when lec_vcc_close() iterates through the hlists in\\npriv-\u003elec_arp_empty_ones or other ARP tables:\\n\\n1. In the first iteration, for the first matched ARP entry sharing the VCC,\\nlec_arp_clear_vccs() frees the associated vpriv (which is vcc-\u003euser_back)\\nand sets vcc-\u003euser_back to NULL.\\n2. In the second iteration, for the next matched ARP entry sharing the same\\nVCC, lec_arp_clear_vccs() is called again. It obtains a NULL vpriv from\\nvcc-\u003euser_back (via LEC_VCC_PRIV(vcc)) and then attempts to dereference it\\nvia `vcc-\u003epop = vpriv-\u003eold_pop`, leading to a null-ptr-deref crash.\\n\\nFix this by adding a null check for vpriv before dereferencing\\nit. If vpriv is already NULL, it means the VCC has been cleared\\nby a previous call, so we can safely skip the cleanup and just\\nclear the entry\u0027s vcc/recv_vcc pointers.\\n\\nThe entire cleanup block (including vcc_release_async()) is placed inside\\nthe vpriv guard because a NULL vpriv indicates the VCC has already been\\nfully released by a prior iteration \u2014 repeating the teardown would\\nredundantly set flags and trigger callbacks on an already-closing socket.\\n\\nThe Fixes tag points to the initial commit because the entry-\u003evcc path has\\nbeen vulnerable since the original code. The entry-\u003erecv_vcc path was later\\nadded by commit 8d9f73c0ad2f (\\\"atm: fix a memory leak of vcc-\u003euser_back\\\")\\nwith the same pattern, and both paths are fixed here.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\natm: lec: corrige desreferencia de puntero nulo en lec_arp_clear_vccs\\n\\nsyzkaller report\u00f3 una desreferencia de puntero nulo en lec_arp_clear_vccs().\\nEste problema puede ser f\u00e1cilmente reproducido usando el reproductor de syzkaller.\\n\\nEn el m\u00f3dulo ATM LANE (Emulaci\u00f3n de LAN), el mismo atm_vcc puede ser compartido por m\u00faltiples entradas de lec_arp_table (por ejemplo, a trav\u00e9s de entry-\u0026gt;vcc o entry-\u0026gt;recv_vcc).\\nCuando el VCC subyacente se cierra, lec_vcc_close() itera sobre todas las entradas ARP y llama a lec_arp_clear_vccs() para cada entrada coincidente.\\n\\nPor ejemplo, cuando lec_vcc_close() itera a trav\u00e9s de las hlists en priv-\u0026gt;lec_arp_empty_ones u otras tablas ARP:\\n\\n1. En la primera iteraci\u00f3n, para la primera entrada ARP coincidente que comparte el VCC, lec_arp_clear_vccs() libera el vpriv asociado (que es vcc-\u0026gt;user_back) y establece vcc-\u0026gt;user_back en NULL.\\n2. En la segunda iteraci\u00f3n, para la siguiente entrada ARP coincidente que comparte el mismo VCC, lec_arp_clear_vccs() es llamada de nuevo. Obtiene un vpriv NULL de vcc-\u0026gt;user_back (a trav\u00e9s de LEC_VCC_PRIV(vcc)) y luego intenta desreferenciarlo a trav\u00e9s de \u0027vcc-\u0026gt;pop = vpriv-\u0026gt;old_pop\u0027, lo que lleva a un fallo por desreferencia de puntero nulo.\\n\\nSoluciona esto a\u00f1adiendo una comprobaci\u00f3n de nulos para vpriv antes de desreferenciarlo. Si vpriv ya es NULL, significa que el VCC ha sido limpiado por una llamada anterior, por lo que podemos omitir de forma segura la limpieza y simplemente limpiar los punteros vcc/recv_vcc de la entrada.\\n\\nEl bloque de limpieza completo (incluyendo vcc_release_async()) se coloca dentro de la guarda de vpriv porque un vpriv NULL indica que el VCC ya ha sido completamente liberado por una iteraci\u00f3n anterior \u2014 repetir el desmontaje establecer\u00eda banderas de forma redundante y activar\u00eda retrollamadas en un socket que ya se est\u00e1 cerrando.\\n\\nLa etiqueta Fixes apunta al commit inicial porque la ruta entry-\u0026gt;vcc ha sido vulnerable desde el c\u00f3digo original. La ruta entry-\u0026gt;recv_vcc fue a\u00f1adida posteriormente por el commit 8d9f73c0ad2f (\u0027atm: fix a memory leak of vcc-\u0026gt;user_back\u0027) con el mismo patr\u00f3n, y ambas rutas se corrigen aqu\u00ed.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/101bacb303e89dc2e0640ae6a5e0fb97c4eb45bb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2d9f57ea29a1f1772373b98a509b44d49fda609e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/30c9744a989feb22cfbb84170eb0e038a7a2c1da\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5f1cfea7921f5c126a441d973690eeba52677b64\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/622062f24644b4536d3f437e0cf7a8c4bb421665\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7ea92ab075d809ec8a96669a5ecf00f752057875\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8aff65a82b6389ec674d46e5b3d3ae6f07db5e3e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e9665986eb127290ceb535bd5d04d7a84265d94f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…