A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2175903 | third party advisory issue tracking |
https://www.debian.org/security/2023/dsa-5480 | vendor advisory |
https://www.debian.org/security/2023/dsa-5492 | vendor advisory |
https://security.netapp.com/advisory/ntap-20230929-0006/ | |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | mailing list |
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html | mailing list |