CVE-2025-68291
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash due to a divide-by-zero error when using MPTCP sockets. This can lead to denial of service (DoS) conditions on affected systems, potentially disrupting network communications and impacting system stability.
Can you explain this vulnerability to me?
This vulnerability is a divide-by-zero error in the Linux kernel's Multipath TCP (MPTCP) implementation. Specifically, the issue occurs because the variable 'rcv_mss' was not initialized before calling the function tcp_send_active_reset() in mptcp_do_fastclose(). This uninitialized value leads to a divide-by-zero error in the __tcp_select_window() function, causing a kernel crash. The fix involved initializing 'rcv_mss' properly to prevent this error.