Impact
A logic flaw in the Linux kernel’s multi‑path TCP (MPTCP) implementation causes the kernel to incorrectly mark an endpoint as available when that endpoint is removed. The bug triggers a warning in the kernel logs and may lead to unstable network state, but no direct exploitation has been documented.
Affected Systems
The issue affects systems running the Linux kernel, particularly versions that include the MPTCP code path prior to the patch that rectifies the flag handling. The exact affected builds are not listed, but any kernel containing the buggy MPTCP implementation is potentially impacted. The most recent development kernel (e.g., 6.18.x) was used in the testing scenario, suggesting that contemporary releases are in scope until the patch is merged.
Risk and Exploitability
The CVE description does not specify a required privilege level; no known exploitation path is documented. The lack of an immediate exploitation path suggests low overall risk, but the unexpected endpoint availability may lead to unstable network behavior, warranting early mitigation.
OpenCVE Enrichment