Impact
A null pointer dereference in the Linux ATM LANE module’s lec_arp_clear_vccs function can cause an unprotected kernel crash. The flaw occurs when an ATM virtual circuit is closed and the cleanup routine is called repeatedly for entries that share the same circuit. Without a guard, the second call dereferences a NULL private structure, leading to a fatal fault. This is a classic null‑pointer exception (CWE‑476) that disrupts system stability and requires a reboot, but does not provide remote code execution or data exposure.
Affected Systems
All Linux kernel builds that include the ATM LANE (LAN Emulation) module are potentially affected, because the vulnerable code path resides in the kernel source. The advisory does not list specific version ranges; therefore any kernel containing the unpatched code is at risk. The fix is referenced by multiple commit identifiers in the provided patch URLs.
Risk and Exploitability
The vulnerability scoring indicates a moderate severity and a very low likelihood of widespread exploitation (<1 % EPSS). It is not featured in the CISA KEV catalog. Exploitation would require the attacker to interact with the ATM subsystem—likely through crafted ATM packets or by loading and manipulating the module from a privileged context—to trigger the fault. The effect is a local denial of service at the kernel level rather than escalation of privileges.
OpenCVE Enrichment