Back to bug 2175903

Who When What Removed Added
Alex 2023-03-06 18:10:51 UTC CC security-response-team
Alex 2023-03-06 18:17:18 UTC Alias CVE-2023-1206
Summary EMBARGOED kernel: hash collisions in the IPv6 connection lookup table EMBARGOED CVE-2023-1206 kernel: hash collisions in the IPv6 connection lookup table
Alex 2023-03-07 12:47:02 UTC CC dfreiber, jburrell, rogbas, vkumar
Alex 2023-03-07 12:49:28 UTC Depends On 2176119, 2176118, 2176117, 2176120
Clifford Perry 2023-03-17 13:45:17 UTC CC cperry, mleitner, sukulkar
sushil kulkarni 2023-03-20 12:46:25 UTC CC atenart
Red Hat Bugzilla 2023-04-01 08:40:34 UTC CC dhoward
Red Hat Bugzilla 2023-05-31 23:37:25 UTC CC cperry
Norm Murray 2023-06-23 01:43:30 UTC CC dbohanno
Alex 2023-06-25 09:32:47 UTC Doc Text A flaw hash collisions in the IPv6 connection lookup table in the Linux kernel IPv6 functionality was found in the way user makes SYN flood. A user located in local network or with high bandwidth connection could use this flaw to increase CPU usage of server that accepts IPV6 packets to 95%.
Alex 2023-06-25 09:57:36 UTC Summary EMBARGOED CVE-2023-1206 kernel: hash collisions in the IPv6 connection lookup table CVE-2023-1206 kernel: hash collisions in the IPv6 connection lookup table
CC allarkin, jdenham, kernel-mgr, ldoskova, rrobaina, rysulliv, wcosta, wmealing, ycote, ymankad
Doc Text A flaw hash collisions in the IPv6 connection lookup table in the Linux kernel IPv6 functionality was found in the way user makes SYN flood. A user located in local network or with high bandwidth connection could use this flaw to increase CPU usage of server that accepts IPV6 packets to 95%. A flaw hash collisions in the IPv6 connection lookup table in the Linux kernel IPv6 functionality was found in the way user makes SYN flood. A user located in the local network (or with high bandwidth connection) could use this flaw to increase CPU usage of server that accepts IPV6 connections up to 95%.
Group security, qe_staff
Alex 2023-06-25 09:58:04 UTC Depends On 2217240
RaTasha Tillery-Smith 2023-06-26 12:31:28 UTC Doc Text A flaw hash collisions in the IPv6 connection lookup table in the Linux kernel IPv6 functionality was found in the way user makes SYN flood. A user located in the local network (or with high bandwidth connection) could use this flaw to increase CPU usage of server that accepts IPV6 connections up to 95%. A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality in how a user creates a SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
Alex 2023-06-29 09:53:12 UTC Fixed In Version kernel 6.4-rc7
Alex 2023-06-29 09:53:47 UTC Fixed In Version kernel 6.4-rc7 kernel 6.5-rc1
Alex 2023-06-29 10:10:44 UTC Doc Text A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality in how a user creates a SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%. A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
Felix Maurer 2023-06-30 08:04:16 UTC CC fmaurer
Flags needinfo?(allarkin)
Alex 2023-07-02 08:16:25 UTC Flags needinfo?(allarkin)
Alex 2023-07-02 08:16:47 UTC Flags needinfo?(fmaurer)
Red Hat Bugzilla 2023-07-07 08:34:25 UTC CC security-response-team
Assignee security-response-team nobody
Felix Maurer 2023-07-25 13:36:10 UTC Flags needinfo?(fmaurer)
Salvatore Bonaccorso 2023-08-16 18:56:19 UTC Flags needinfo?(allarkin)
CC carnil

Back to bug 2175903