CVE-2025-68246
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP connection limit is exceeded in ksmbd_kthread_fn(), the code sets ret = -EAGAIN and continues the accept loop without closing the just-accepted socket. That leaks one socket per rejected attempt from a single IP and enables a trivial remote DoS. Release client_sk before continuing. This bug was found with ZeroPath.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's ksmbd component, where when the per-IP connection limit is exceeded, the code fails to close the newly accepted socket. Instead, it sets an error and continues accepting connections, which causes a socket to be leaked for each rejected connection attempt from a single IP. This leads to resource exhaustion and enables a trivial remote denial-of-service (DoS) attack.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker to exhaust system resources through leaking sockets when the per-IP connection limit is exceeded. This can cause a denial-of-service (DoS) condition, making the affected system unresponsive or unable to accept legitimate connections.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update your Linux kernel to a version where the ksmbd per-IP connection limit bug is fixed. This fix ensures that accepted sockets are properly closed when the per-IP limit is exceeded, preventing socket leaks and remote DoS attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart