CVE-2025-68339

Source
https://cve.org/CVERecord?id=CVE-2025-68339
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68339.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68339
Downstream
Related
Published
2025-12-23T13:58:24.955Z
Modified
2026-03-13T04:04:09.857906Z
Summary
atm/fore200e: Fix possible data race in fore200e_open()
Details

In the Linux kernel, the following vulnerability has been resolved:

atm/fore200e: Fix possible data race in fore200e_open()

Protect access to fore200e->availablecellrate with ratemtx lock in the error handling path of fore200eopen() to prevent a data race.

The field fore200e->availablecellrate is a shared resource used to track available bandwidth. It is concurrently accessed by fore200eopen(), fore200eclose(), and fore200echangeqos().

In fore200eopen(), the lock ratemtx is correctly held when subtracting vcc->qos.txtp.maxpcr from availablecellrate to reserve bandwidth. However, if the subsequent call to fore200eactivatevcin() fails, the function restores the reserved bandwidth by adding back to availablecell_rate without holding the lock.

This introduces a race condition because availablecellrate is a global device resource shared across all VCCs. If the error path in fore200eopen() executes concurrently with operations like fore200eclose() or fore200echangeqos() on other VCCs, a read-modify-write race occurs.

Specifically, the error path reads the rate without the lock. If another CPU acquires the lock and modifies the rate (e.g., releasing bandwidth in fore200e_close()) between this read and the subsequent write, the error path will overwrite the concurrent update with a stale value. This results in incorrect bandwidth accounting.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68339.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
1b60f42a639999c37da7f1fbfa1ad29cf4cbdd2d
Fixed
bd1415efbab507b9b995918105eef953013449dd
Fixed
ed34c70d88e2b8b9bc6c3ede88751186d6c6d5d1
Fixed
9917ba597cf95f307778e495f71ff25a5064d167
Fixed
667ac868823224374f819500adc5baa2889c7bc5
Fixed
6610361458e7eb6502dd3182f586f91fcc218039
Fixed
82fca3d8a4a34667f01ec2351a607135249c9cff

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68339.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
5.10.247
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.197
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.119
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.61
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.11

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68339.json"