ALT-PU-2023-4936-1
Package kernel-image-centos updated to version 5.14.0.354-alt1.el9 for branch sisyphus in task 327173.
Closed vulnerabilities
Published: 2023-03-06
BDU:2023-03642
Уязвимость реализации протокола IPv6 ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Severity: MEDIUM (5.7)
Vector: AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Severity: MEDIUM (5.5)
Vector: AV:A/AC:L/Au:S/C:N/I:N/A:C
References:
Published: 2023-06-30
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2023-1206
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
Severity: MEDIUM (5.7)
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2175903
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://security.netapp.com/advisory/ntap-20230929-0006/
- https://www.debian.org/security/2023/dsa-5480
- https://www.debian.org/security/2023/dsa-5492
- https://bugzilla.redhat.com/show_bug.cgi?id=2175903
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://security.netapp.com/advisory/ntap-20230929-0006/
- https://www.debian.org/security/2023/dsa-5480
- https://www.debian.org/security/2023/dsa-5492