CVE-2025-68227
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of Multipath TCP (MPTCP) when combined with the sockmap feature that uses BPF (Berkeley Packet Filter). Specifically, when a server has MPTCP enabled but a client sends a TCP SYN without MPTCP, the kernel performs a fallback that replaces the subflow socket's protocol pointer (sk_prot) with the native protocol. However, when sockmap is used, it replaces the native sk_prot with a custom one, causing incorrect comparisons and potentially setting socket operations incorrectly. This could also trigger kernel warnings. The fix changes the comparison method to use a more generic socket family identifier (sk_family) to avoid these issues.
How can this vulnerability impact me? :
This vulnerability can lead to incorrect handling of socket operations in the Linux kernel when using MPTCP with sockmap and BPF features. This may cause unexpected behavior in network connections, potential instability, or kernel warnings. While no direct exploit or impact is detailed, the incorrect protocol handling could affect network reliability or security in systems relying on these features.