CVE-2025-68221
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's multipath TCP (mptcp) implementation. Specifically, it involves a flaw in the address removal logic within the mptcp_pm_nl_rm_addr function. The issue is that the code incorrectly handles the decrementing of an address removal counter due to an inverted WARN_ON_ONCE condition. As a result, normal address removals where the counter is greater than zero are ignored, and only abnormal cases where the counter is zero trigger the decrement logic. This could lead to improper management of address removal in multipath TCP.
How can this vulnerability impact me? :
The vulnerability can impact the stability and correctness of multipath TCP connections on affected Linux systems. Because normal address removals are ignored, the system may not properly update or manage network addresses used in multipath TCP, potentially leading to connection issues, resource leaks, or unexpected network behavior. This could affect applications relying on multipath TCP for network redundancy or performance.