Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP connection limit is exceeded in ksmbd_kthread_fn(), the code sets ret = -EAGAIN and continues the accept loop without closing the just-accepted socket. That leaks one socket per rejected attempt from a single IP and enables a trivial remote DoS. Release client_sk before continuing. This bug was found with ZeroPath.
References
- https://git.kernel.org/stable/c/35521b5a7e8a184548125f4530552101236dcda1
- https://git.kernel.org/stable/c/4587a7826be1ae0190dba10ff70b46bb0e3bc7d3
- https://git.kernel.org/stable/c/5746b2a0f5eb3d79667b3c51fe849bd62464220e
- https://git.kernel.org/stable/c/7a3c7154d5fc05956a8ad9e72ecf49e21555bfca
- https://git.kernel.org/stable/c/98a5fd31cbf72d46bf18e50b3ab0ce86d5f319a9
FAQ
What is CVE-2025-68246?
CVE-2025-68246 is a documented vulnerability. In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP connection limit is exceeded in ksmbd_kthread_fn...
How severe is CVE-2025-68246?
CVSS scoring is not yet available for CVE-2025-68246. Check NVD for updates.
Is there a patch for CVE-2025-68246?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.