A flaw exists within the Linux kernel's handling of new TCP connections. The issue results from the lack of memory release after its effective lifetime. This vulnerability allows an unauthenticated attacker to create a denial of service condition on the system.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Jul 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 30 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Jul 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw exists within the Linux kernel's handling of new TCP connections. The issue results from the lack of memory release after its effective lifetime. This vulnerability allows an unauthenticated attacker to create a denial of service condition on the system. | |
Title | Kernel: ksmbd memory exhaustion denial-of-service vulnerability | |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
Weaknesses | CWE-835 | |
CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-07-30T15:15:53.952Z
Updated: 2025-07-31T18:53:37.275Z
Reserved: 2023-05-09T12:05:43.066Z
Link: CVE-2023-2593

Updated: 2025-07-30T15:32:21.918Z

Status : Awaiting Analysis
Published: 2025-07-30T16:15:25.980
Modified: 2025-07-31T19:15:27.840
Link: CVE-2023-2593

No data.