CVE-2025-68246
Published: December 19, 2025Last modified: December 19, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP connection limit is exceeded in ksmbd_kthread_fn(), the code sets ret = -EAGAIN and continues the accept loop without closing the just-accepted socket. That leaks one socket per rejected attempt from a single IP and enables a trivial remote DoS. Release client_sk before continuing. This bug was found with ZeroPath.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.159-r0) |
| 25 LTS | linux-lts | Fixed (6.12.61-r0) | |
| Stream | linux-lts | Fixed (6.12.61-r0) |
References
- https://git.kernel.org/stable/c/35521b5a7e8a184548125f4530552101236dcda1
- https://git.kernel.org/stable/c/4587a7826be1ae0190dba10ff70b46bb0e3bc7d3
- https://git.kernel.org/stable/c/5746b2a0f5eb3d79667b3c51fe849bd62464220e
- https://git.kernel.org/stable/c/7a3c7154d5fc05956a8ad9e72ecf49e21555bfca
- https://git.kernel.org/stable/c/98a5fd31cbf72d46bf18e50b3ab0ce86d5f319a9