VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40133

CVE-2025-40133

Description

In the Linux kernel, the following vulnerability has been resolved:

mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().

mptcp_active_enable() is called from subflow_finish_connect(), which is icsk->icsk_af_ops->sk_rx_dst_set() and it's not always under RCU.

Using sk_dst_get(sk)->dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free in Linux kernel's MPTCP subsystem, caused by improper RCU locking in mptcp_active_enable(), allows local privilege escalation.

Vulnerability

Overview

In the Linux kernel, the MPTCP (Multipath TCP) implementation suffers from a use-after-free (UAF) vulnerability in the function mptcp_active_enable(). This function is called from subflow_finish_connect() via the sk_rx_dst_set() callback of the inet connection struct. The root cause is that mptcp_active_enable() uses sk_dst_get(sk)->dev to access the device associated with the socket's destination cache entry, but this operation is performed without ensuring proper RCU (Read-Copy-Update) protection. The call path is not always under an RCU read-side critical section, leading to a potential UAF when the `dev should be accessed only within an RCU section [1].

Exploitation

To exploit this, an attacker needs local access to the system and the ability to trigger MPTCP connection setup. No special privileges are required beyond the ability to initiate MPTCP subflows (e.g., via a malicious application that uses MPTCP sockets). The race condition occurs when the dst_entry is concurrently freed while being accessed, resulting in a use-after-free condition. The attacker may control the freed memory to gain code execution.

Impact

Successful exploitation could allow an unprivileged local attacker to escalate privileges to root or cause a denial of service (system crash). As kernel memory corruption is involved, the impact is severe [1].

Mitigation

The fix has been applied in the Linux kernel stable tree via commit cc976ec9e38bb79409de3261ba1dbb6868e2a53e. It replaces the unsafe access with __sk_dst_get() and dst_dev_rcu() to ensure proper RCU protection. Affected users should update to a kernel containing this commit.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.