发布时间: 2023年9月2日
修改时间: 2024年10月31日
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Adjacent | Adjacent |
CVSS评分 | 5.7 | 5.7 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-2249 | kernel security update | 2023年9月2日 |
KylinSec-SA-2023-2247 | kernel security update | 2023年9月2日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Fixed |
KY3.4-5A | kernel | Fixed |
KY3.5.1 | kernel | Fixed |
KY3.5.2 | kernel | Fixed |