CVE-2026-43203
Use-After-Free in Linux Kernel's fore200e ATM Driver
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the fore200e driver is updated to a version where the fix is applied. The fix involves properly canceling the tx_tasklet or rx_tasklet before the fore200e device is released by adding tasklet_kill() in fore200e_shutdown(). This prevents use-after-free conditions during device removal.
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's fore200e driver for PCA-200E or SBA-200E adapters. When one of these adapters is removed, the fore200e device structure is deallocated, but the tx_tasklet or rx_tasklet (which handle transmission and reception tasks) may still be running or scheduled to run. If these tasklets access the already freed fore200e structure, it leads to a use-after-free condition.
The issue arises due to a race condition between the cleanup process that frees the fore200e structure and the tasklets that may still be executing. The fix involves properly canceling these tasklets using tasklet_kill() after resetting the device but before freeing the structure, ensuring no tasklets access freed memory.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to undefined behavior in the Linux kernel, such as system crashes, data corruption, or potential escalation of privileges if exploited. Since the kernel accesses freed memory, it may cause instability or security issues on systems using the affected PCA-200E or SBA-200E adapters.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability was identified through static analysis and involves a use-after-free bug in the fore200e driver during device removal. There are no specific detection commands or network/system indicators provided.