A flaw in the Linux Kernel found in the Linux kernel’s networking stack which permits attackers to force hash collisions in the IPv6 connection lookup table. This results in a significant increase in the cost of lookups, causing increased CPU utilization. This significant CPU usage increase in the Linux kernel subjected to a modified form of the classic IPv6 SYN-Flood. The actual impact of this issue may be a denial of service (due to heightened CPU usage) to hosts which can receive malicious IPv6 traffic.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2217240]
Is https://git.kernel.org/linus/d11b0df7ddf1831f3e170972f43186dad520bfcc the fix for this issue? (which would be in 6.5-rc4)?
In reply to comment #19: > Is https://git.kernel.org/linus/d11b0df7ddf1831f3e170972f43186dad520bfcc the > fix for this issue? (which would be in 6.5-rc4)? Yes, the similar upstream fix has been merged into net.git: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=d11b0df7ddf1831f3e170972f43186dad520bfcc The previous ( https://lore.kernel.org/netdev/CANn89i%2B6d9K1VwNK1Joc-Yb_4jAfV_YFzk%3Dz_K2_Oy%2BxJHSn_g%40mail.gmail.com/T/ ) were not accepted.
This was fixed for Fedora with the 6.4.8 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:5603 https://access.redhat.com/errata/RHSA-2023:5603
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:5604 https://access.redhat.com/errata/RHSA-2023:5604
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:5627 https://access.redhat.com/errata/RHSA-2023:5627
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:6583
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:6901
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2023:7077
This comment was flagged a spam, view the edit history to see the original text if required.