CVE-2025-68339
Data Race in Linux Kernel atm/fore200e Causes Bandwidth Misaccounting
Publication date: 2025-12-23
Last updated on: 2025-12-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data race condition in the Linux kernel's fore200e driver. Specifically, in the fore200e_open() function, the code fails to properly lock access to the shared resource 'available_cell_rate' during an error handling path. When fore200e_activate_vcin() fails, the function restores reserved bandwidth without holding the necessary lock, leading to concurrent access issues. This can cause incorrect bandwidth accounting because multiple threads may read and write to 'available_cell_rate' simultaneously without synchronization.
How can this vulnerability impact me? :
The vulnerability can lead to incorrect bandwidth accounting in the affected device. Because of the race condition, bandwidth may be improperly reserved or released, potentially causing network performance issues or resource mismanagement. This could affect the stability and reliability of network connections managed by the fore200e driver.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fore200e driver has been patched to fix the data race in fore200e_open(). This involves ensuring that the fore200e_open() function properly protects access to available_cell_rate with the rate_mtx lock in all code paths, including error handling. Until the patch is applied, avoid using the fore200e driver or disable the affected ATM device if possible to prevent race conditions.