Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAG=tWCQzAE6rdBztTBiGvhuLoCMLbMqdkSU5UgXVe7ZcNRS6Mw@mail.gmail.com>
Date: Mon, 15 Sep 2025 17:13:04 +0800
From: tianshuo han <hantianshuo233@...il.com>
To: oss-security@...ts.openwall.com
Subject: [CVE-2025-38501] Linux kernel: KSMBD service DoS by TCP handshake

Hello,

A security vulnerability in the Linux kernel KSMBD subsystem has been
assigned CVE-2025-38501. This issue allows a remote attacker to exhaust
the KSMBD server's TCP connection limit and prevent other normal client
connections.

Details:
- CVE: CVE-2025-38501
- Subsystem: KSMBD
- Impact: Remote Denial of Service (exhaust KSMBD server's max
connections)
- Affected versions: Since KSMBD merged into kernel main line in 5.15
- Fixed in: Upstream commit e6bb9193974059ddbb0ce7763fa3882bd60d4dc3

Description:
A remote attacker can exhaust a KSMBD server’s maximum connection
limit by performing a TCP 3-way handshake and then not responding to
further packets. By default, the KSMBD server will hold such
connections indefinitely, allowing an attacker to consume all available
connections. While a timeout can be configured in the user-space
configuration file (with a minimum of 1 minute), an attacker from a
single IP address can still cause a DoS to the SMB service by
repeatedly initiating such connections.

Reproducer:
A public proof-of-concept (PoC) is available at:
https://github.com/keymaker-arch/KSMBDrain

Timeline:
- Reported to Linux kernel community: 2025-08-01
- Patch merged upstream: 2025-08-08
- CVE assigned and public: 2025-08-18

Best regards,
Tianshuo Han

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.