CVE-2026-23286
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
18/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
atm: lec: fix null-ptr-deref in lec_arp_clear_vccs<br />
<br />
syzkaller reported a null-ptr-deref in lec_arp_clear_vccs().<br />
This issue can be easily reproduced using the syzkaller reproducer.<br />
<br />
In the ATM LANE (LAN Emulation) module, the same atm_vcc can be shared by<br />
multiple lec_arp_table entries (e.g., via entry->vcc or entry->recv_vcc).<br />
When the underlying VCC is closed, lec_vcc_close() iterates over all<br />
ARP entries and calls lec_arp_clear_vccs() for each matched entry.<br />
<br />
For example, when lec_vcc_close() iterates through the hlists in<br />
priv->lec_arp_empty_ones or other ARP tables:<br />
<br />
1. In the first iteration, for the first matched ARP entry sharing the VCC,<br />
lec_arp_clear_vccs() frees the associated vpriv (which is vcc->user_back)<br />
and sets vcc->user_back to NULL.<br />
2. In the second iteration, for the next matched ARP entry sharing the same<br />
VCC, lec_arp_clear_vccs() is called again. It obtains a NULL vpriv from<br />
vcc->user_back (via LEC_VCC_PRIV(vcc)) and then attempts to dereference it<br />
via `vcc->pop = vpriv->old_pop`, leading to a null-ptr-deref crash.<br />
<br />
Fix this by adding a null check for vpriv before dereferencing<br />
it. If vpriv is already NULL, it means the VCC has been cleared<br />
by a previous call, so we can safely skip the cleanup and just<br />
clear the entry&#39;s vcc/recv_vcc pointers.<br />
<br />
The entire cleanup block (including vcc_release_async()) is placed inside<br />
the vpriv guard because a NULL vpriv indicates the VCC has already been<br />
fully released by a prior iteration — repeating the teardown would<br />
redundantly set flags and trigger callbacks on an already-closing socket.<br />
<br />
The Fixes tag points to the initial commit because the entry->vcc path has<br />
been vulnerable since the original code. The entry->recv_vcc path was later<br />
added by commit 8d9f73c0ad2f ("atm: fix a memory leak of vcc->user_back")<br />
with the same pattern, and both paths are fixed here.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/101bacb303e89dc2e0640ae6a5e0fb97c4eb45bb
- https://git.kernel.org/stable/c/2d9f57ea29a1f1772373b98a509b44d49fda609e
- https://git.kernel.org/stable/c/30c9744a989feb22cfbb84170eb0e038a7a2c1da
- https://git.kernel.org/stable/c/5f1cfea7921f5c126a441d973690eeba52677b64
- https://git.kernel.org/stable/c/622062f24644b4536d3f437e0cf7a8c4bb421665
- https://git.kernel.org/stable/c/7ea92ab075d809ec8a96669a5ecf00f752057875
- https://git.kernel.org/stable/c/8aff65a82b6389ec674d46e5b3d3ae6f07db5e3e
- https://git.kernel.org/stable/c/e9665986eb127290ceb535bd5d04d7a84265d94f



