🔐 CVE Alert

CVE-2023-1206

UNKNOWN 0.0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

CWE CWE-400
Vendor n/a
Product kernel
Published Jun 30, 2023
Last Updated Oct 15, 2024
Stay Ahead of the Next One

Get instant alerts for n/a kernel

Be the first to know when new unknown vulnerabilities affecting n/a kernel are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

n/a / Kernel
kernel 6.5-rc1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2175903 debian.org: https://www.debian.org/security/2023/dsa-5480 debian.org: https://www.debian.org/security/2023/dsa-5492 security.netapp.com: https://security.netapp.com/advisory/ntap-20230929-0006/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html