CVE-2023-1206
CVSS V2 None
CVSS V3 None
Description
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
Overview
- CVE ID
- CVE-2023-1206
- Assigner
- redhat
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-06-30T00:00:00
- Last Modified Date
- 2024-01-11T19:06:53.711288
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2175903 | |
https://www.debian.org/security/2023/dsa-5480 | vendor-advisory |
https://www.debian.org/security/2023/dsa-5492 | vendor-advisory |
https://security.netapp.com/advisory/ntap-20230929-0006/ | |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | mailing-list |
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | mailing-list |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-1206 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 08:41:14 | Added to TrackCVE |