CVE-2025-21705
📋 TL;DR
This vulnerability in the Linux kernel's MPTCP (Multipath TCP) implementation allows data stream corruption when handling TCP Fast Open connection errors. The issue occurs when disconnect() is called internally during Fast Open failures, leading to improper socket state management. Systems using Linux kernels with MPTCP enabled are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Data corruption in MPTCP connections leading to application crashes, denial of service, or potential information disclosure through corrupted data streams.
Likely Case
MPTCP connection failures or crashes when TCP Fast Open encounters errors, causing service disruption for applications using MPTCP.
If Mitigated
Minor performance impact or connection retries when MPTCP Fast Open fails, with proper error handling preventing crashes.
🎯 Exploit Status
Exploitation requires triggering specific TCP Fast Open error conditions on MPTCP connections. Discovered via syzkaller fuzzing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits: 0263fb2e7b7b88075a5d86e74c4384ee4400828d, 619af16b3b57a3a4ee50b9a30add9ff155541e71, 6ec806762318a4adde0ea63342d42d0feae95079, 73e268b4be27b36ae68ea10755cb003f43b38884, 84ac44d9fed3a56440971cbd7600a02b70b5b32a
Vendor Advisory: https://git.kernel.org/stable/c/0263fb2e7b7b88075a5d86e74c4384ee4400828d
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Check with your distribution for available kernel updates. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable MPTCP
linuxDisable MPTCP support if not required
echo 'net.mptcp.enabled = 0' >> /etc/sysctl.conf
sysctl -p
Disable TCP Fast Open
linuxDisable TCP Fast Open feature
echo 'net.ipv4.tcp_fastopen = 0' >> /etc/sysctl.conf
sysctl -p
🧯 If You Can't Patch
- Disable MPTCP via sysctl if not required for your applications
- Implement network monitoring for MPTCP connection failures and restart affected services
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if MPTCP is enabled: 'uname -r' and 'sysctl net.mptcp.enabled'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits or is newer than vulnerable versions. Check with 'uname -r' and compare with distribution's patched versions.
📡 Detection & Monitoring
Log Indicators:
- Kernel warnings mentioning '__mptcp_clean_una' or MPTCP protocol errors
- Application logs showing MPTCP connection failures
Network Indicators:
- Unexpected MPTCP connection resets or failures
- TCP Fast Open connection attempts failing
SIEM Query:
source="kernel" AND ("__mptcp_clean_una" OR "MPTCP" OR "fastopen")
🔗 References
- https://git.kernel.org/stable/c/0263fb2e7b7b88075a5d86e74c4384ee4400828d
- https://git.kernel.org/stable/c/619af16b3b57a3a4ee50b9a30add9ff155541e71
- https://git.kernel.org/stable/c/6ec806762318a4adde0ea63342d42d0feae95079
- https://git.kernel.org/stable/c/73e268b4be27b36ae68ea10755cb003f43b38884
- https://git.kernel.org/stable/c/84ac44d9fed3a56440971cbd7600a02b70b5b32a
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html