CVE-2023-1206
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
| CWE | CWE-400 |
| Vendor | n/a |
| Product | kernel |
| Published | Jun 30, 2023 |
| Last Updated | Oct 15, 2024 |
Stay Ahead of the Next One
Get instant alerts for n/a kernel
Be the first to know when new unknown vulnerabilities affecting n/a kernel are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
n/a / Kernel
kernel 6.5-rc1
References
bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2175903 debian.org: https://www.debian.org/security/2023/dsa-5480 debian.org: https://www.debian.org/security/2023/dsa-5492 security.netapp.com: https://security.netapp.com/advisory/ntap-20230929-0006/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html