CVE-2025-68246

medium

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP connection limit is exceeded in ksmbd_kthread_fn(), the code sets ret = -EAGAIN and continues the accept loop without closing the just-accepted socket. That leaks one socket per rejected attempt from a single IP and enables a trivial remote DoS. Release client_sk before continuing. This bug was found with ZeroPath.

References

https://git.kernel.org/stable/c/98a5fd31cbf72d46bf18e50b3ab0ce86d5f319a9

https://git.kernel.org/stable/c/7a3c7154d5fc05956a8ad9e72ecf49e21555bfca

https://git.kernel.org/stable/c/5746b2a0f5eb3d79667b3c51fe849bd62464220e

https://git.kernel.org/stable/c/4587a7826be1ae0190dba10ff70b46bb0e3bc7d3

https://git.kernel.org/stable/c/35521b5a7e8a184548125f4530552101236dcda1

Details

Source: Mitre, NVD

Published: 2025-12-16

Updated: 2025-12-18

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Severity: High

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018