
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-21875 affects the Linux kernel's MPTCP (Multipath TCP) implementation, specifically related to address removal handling under MSK socket lock. The vulnerability was discovered on March 27, 2025, when Syzkaller reported a lockdep splat in the PM control path (NVD).
The vulnerability manifests as a race condition where the PM (Path Manager) can attempt to send a RMADDR over an MSK socket without first acquiring the MSK socket lock. This issue stems from an optimization where RMADDR notifications were not sent when there were no subflows. However, this optimization proved problematic as without proper locks, another process could cause concurrent access issues (NVD).
The vulnerability could lead to race conditions in the MPTCP implementation, potentially affecting network stability and reliability. The issue specifically impacts the address removal functionality in the MPTCP path management system (NVD).
The vulnerability has been resolved in the Linux kernel by ensuring proper handling of address removal under MSK socket lock. The fix involves correcting the assumption about RM_ADDR notifications when there are no subflows (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."