VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68221

CVE-2025-68221

Description

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix address removal logic in mptcp_pm_nl_rm_addr

Fix inverted WARN_ON_ONCE condition that prevented normal address removal counter updates. The current code only executes decrement logic when the counter is already 0 (abnormal state), while normal removals (counter > 0) are ignored.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel MPTCP: inverted WARN_ON_ONCE in address removal logic prevents normal counter updates; removals only decrement when counter is already zero.

Vulnerability

Overview

The vulnerability resides in the MPTCP path manager's address removal function, mptcp_pm_nl_rm_addr. The condition for the WARN_ON_ONCE macro is inverted [1]. As a result, the intended error detection (counter already zero) triggers the warning, but the decrement logic is executed only when the counter is already zero, which is the opposite of correct behaviour. Normal removals where the counter is greater than zero skip the decrement entirely, leaving the counter unchanged and the internal state inconsistent.

Attack

Surface

This bug is triggered during normal MPTCP address removal operations, such as when a user or system removes a local address used by an MPTCP connection via netlink commands. This requires the CAP_NET_ADMIN privilege or root access. The scenario is thus limited to users who already have administrative control over network configuration. No additional attack vectors are described.

Impact

An attacker with the required privileges can cause the MPTCP path manager to maintain an inflated counter of addresses in use. This may lead to resource leaks, inability to add new addresses, or other unexpected behaviour. The impact is primarily a denial-of-service condition or hang on MPTCP subflow operations.

Mitigation

The fix is included in the stable kernel commit referenced [1]. Users are advised to update to a kernel version containing this patch or backport the fix. No known workarounds are available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.