Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43203
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:28
Updated At-11 May, 2026 | 22:19
Rejected At-
▼CVE Numbering Authority (CNA)
atm: fore200e: fix use-after-free in tasklets during device removal

In the Linux kernel, the following vulnerability has been resolved: atm: fore200e: fix use-after-free in tasklets during device removal When the PCA-200E or SBA-200E adapter is being detached, the fore200e is deallocated. However, the tx_tasklet or rx_tasklet may still be running or pending, leading to use-after-free bug when the already freed fore200e is accessed again in fore200e_tx_tasklet() or fore200e_rx_tasklet(). One of the race conditions can occur as follows: CPU 0 (cleanup) | CPU 1 (tasklet) fore200e_pca_remove_one() | fore200e_interrupt() fore200e_shutdown() | tasklet_schedule() kfree(fore200e) | fore200e_tx_tasklet() | fore200e-> // UAF Fix this by ensuring tx_tasklet or rx_tasklet is properly canceled before the fore200e is released. Add tasklet_kill() in fore200e_shutdown() to synchronize with any pending or running tasklets. Moreover, since fore200e_reset() could prevent further interrupts or data transfers, the tasklet_kill() should be placed after fore200e_reset() to prevent the tasklet from being rescheduled in fore200e_interrupt(). Finally, it only needs to do tasklet_kill() when the fore200e state is greater than or equal to FORE200E_STATE_IRQ, since tasklets are uninitialized in earlier states. In a word, the tasklet_kill() should be placed in the FORE200E_STATE_IRQ branch within the switch...case structure. This bug was identified through static analysis.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/atm/fore200e.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 91f25749aaf57c47ae1e12478144e6ea8c8562f2 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 73fbc5d1a9ccb626937500bbd67136f077d8237b (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before aba0b4bc09376dfc3d53c826514fe38fc8337f52 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e075ec9b08f862dade8011481058f7eb5f716c57 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 97900f512252a59f23d6ce4ab215cc88fed66e68 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before e4ff4e3ffcf9d5aad380cdd1d8cdc008bb34f97d (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5189368f10903956be05062d160b2804bf5e5016 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8930878101cd40063888a68af73b1b0f8b6c79bc (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/atm/fore200e.c
Default Status
affected
Versions
Affected
  • 2.6.12
Unaffected
  • From 0 before 2.6.12 (semver)
  • From 5.10.252 through 5.10.* (semver)
  • From 5.15.202 through 5.15.* (semver)
  • From 6.1.165 through 6.1.* (semver)
  • From 6.6.128 through 6.6.* (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/91f25749aaf57c47ae1e12478144e6ea8c8562f2
N/A
https://git.kernel.org/stable/c/73fbc5d1a9ccb626937500bbd67136f077d8237b
N/A
https://git.kernel.org/stable/c/aba0b4bc09376dfc3d53c826514fe38fc8337f52
N/A
https://git.kernel.org/stable/c/e075ec9b08f862dade8011481058f7eb5f716c57
N/A
https://git.kernel.org/stable/c/97900f512252a59f23d6ce4ab215cc88fed66e68
N/A
https://git.kernel.org/stable/c/e4ff4e3ffcf9d5aad380cdd1d8cdc008bb34f97d
N/A
https://git.kernel.org/stable/c/5189368f10903956be05062d160b2804bf5e5016
N/A
https://git.kernel.org/stable/c/8930878101cd40063888a68af73b1b0f8b6c79bc
N/A
Hyperlink: https://git.kernel.org/stable/c/91f25749aaf57c47ae1e12478144e6ea8c8562f2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/73fbc5d1a9ccb626937500bbd67136f077d8237b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/aba0b4bc09376dfc3d53c826514fe38fc8337f52
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e075ec9b08f862dade8011481058f7eb5f716c57
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/97900f512252a59f23d6ce4ab215cc88fed66e68
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e4ff4e3ffcf9d5aad380cdd1d8cdc008bb34f97d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5189368f10903956be05062d160b2804bf5e5016
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8930878101cd40063888a68af73b1b0f8b6c79bc
Resource: N/A
Details not found