Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-1206
HistoryJun 30, 2023 - 12:00 a.m.

CVE-2023-1206

2023-06-3000:00:00
ubuntu.com
ubuntu.com
13
cve-2023-1206
linux kernel
ipv6
hash collision
syn flood attack
cpu usage
bugzilla
redhat
suse
network
bandwidth

5.7 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%

A hash collision flaw was found in the IPv6 connection lookup table in the
Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood
attack. A user located in the local network or with a high bandwidth
connection can increase the CPU usage of the server that accepts IPV6
connections up to 95%.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-219.230UNKNOWN
ubuntu20.04noarchlinux< 5.4.0-164.181UNKNOWN
ubuntu22.04noarchlinux< 5.15.0-86.96UNKNOWN
ubuntu23.04noarchlinux< 6.2.0-34.34UNKNOWN
ubuntu14.04noarchlinux< 3.13.0-194.245UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-246.280UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1162.175UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1111.120UNKNOWN
ubuntu22.04noarchlinux-aws< 5.15.0-1047.52UNKNOWN
ubuntu23.04noarchlinux-aws< 6.2.0-1013.13UNKNOWN
Rows per page:
1-10 of 881

5.7 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%