CVE-2026-23286
Null Pointer Dereference in Linux ATM LANE Module Causes Crash
Publication date: 2026-03-25
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's ATM LANE (LAN Emulation) module, specifically in the lec_arp_clear_vccs() function.
The issue occurs because multiple ARP entries can share the same atm_vcc (virtual circuit connection). When the underlying VCC is closed, the function lec_vcc_close() iterates over all ARP entries and calls lec_arp_clear_vccs() for each one.
During this iteration, the first call to lec_arp_clear_vccs() frees a resource (vpriv) and sets a pointer (vcc->user_back) to NULL. On the next iteration, lec_arp_clear_vccs() tries to dereference this now NULL pointer, causing a null pointer dereference crash.
The fix adds a null check before dereferencing the pointer to avoid the crash, skipping cleanup if the resource has already been released.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a null pointer dereference, leading to a denial of service (DoS) condition.
If exploited or triggered, it could cause system instability or unexpected reboots, affecting availability of services running on the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a null pointer dereference in the Linux kernel's ATM LANE module, specifically in the lec_arp_clear_vccs() function. It can be reproduced using the syzkaller reproducer tool.
To detect this vulnerability on your system, you can attempt to reproduce the issue using syzkaller, a kernel fuzzing tool designed to find such bugs.
There are no specific commands provided in the available information to detect this vulnerability directly on a running system or network.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed by adding a null check in the lec_arp_clear_vccs() function to prevent dereferencing a NULL pointer.
Immediate mitigation steps include updating the Linux kernel to a version that contains this fix.
No other specific mitigation steps or workarounds are provided in the available information.