June 30, 2023, 10:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.

attack bandwidth collision connections cpu cve fedora flaw flood hash high ipv6 linux local local network network server syn syn flood

Principal Engineer - DLP Endpoint Security

@ Netskope | Bengaluru, Karnataka, India

Security Consultant (m/w/d)

@ Deutsche Telekom | Berlin, Deutschland

Security Engineer

@ IDEMIA | Haarlem, NL, 2031 CC

CyberSecurity Forensics and Incident Response Analyst

@ Bosch Group | Pittsburgh, PA, United States

Cyber MS MDR - Sr Associate

@ KPMG India | Bengaluru, Karnataka, India

Senior Lead Cybersecurity Architect-Threat modeling, Cryptography

@ JPMorgan Chase & Co. | India