mbox series

[SRU,Focal/Jammy/HWE-5.19/OEM-6.0/OEM-6.1/Lunar,0/1] CVE-2023-1206

Message ID 20230811005700.441021-1-cengiz.can@canonical.com
Headers show
Series CVE-2023-1206 | expand

Message

Cengiz Can Aug. 11, 2023, 12:56 a.m. UTC
[Impact]
A hash collision flaw was found in the IPv6 connection lookup table in the
Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood
attack. A user located in the local network or with a high bandwidth connection
can increase the CPU usage of the server that accepts IPV6 connections up to
95%.

[Fix]
Cherry picked from upstream to all kernels.

[Test case]
Compile and boot tested only.

[Potential regression]
IPv6 users can be affected, however highly unlikely since the fix only improves
an inline hash calculation function.

Stewart Smith (1):
  tcp: Reduce chance of collisions in inet6_hashfn().

 include/net/ipv6.h | 8 ++------
 1 file changed, 2 insertions(+), 6 deletions(-)

Comments

Tim Gardner Aug. 11, 2023, 1:07 p.m. UTC | #1
On 8/10/23 6:56 PM, Cengiz Can wrote:
> [Impact]
> A hash collision flaw was found in the IPv6 connection lookup table in the
> Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood
> attack. A user located in the local network or with a high bandwidth connection
> can increase the CPU usage of the server that accepts IPV6 connections up to
> 95%.
> 
> [Fix]
> Cherry picked from upstream to all kernels.
> 
> [Test case]
> Compile and boot tested only.
> 
> [Potential regression]
> IPv6 users can be affected, however highly unlikely since the fix only improves
> an inline hash calculation function.
> 
> Stewart Smith (1):
>    tcp: Reduce chance of collisions in inet6_hashfn().
> 
>   include/net/ipv6.h | 8 ++------
>   1 file changed, 2 insertions(+), 6 deletions(-)
> 
Acked-by: Tim Gardner <tim.gardner@canonical.com>
Timo Aaltonen Aug. 22, 2023, 10:36 a.m. UTC | #2
Cengiz Can kirjoitti 11.8.2023 klo 3.56:
> [Impact]
> A hash collision flaw was found in the IPv6 connection lookup table in the
> Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood
> attack. A user located in the local network or with a high bandwidth connection
> can increase the CPU usage of the server that accepts IPV6 connections up to
> 95%.
> 
> [Fix]
> Cherry picked from upstream to all kernels.
> 
> [Test case]
> Compile and boot tested only.
> 
> [Potential regression]
> IPv6 users can be affected, however highly unlikely since the fix only improves
> an inline hash calculation function.
> 
> Stewart Smith (1):
>    tcp: Reduce chance of collisions in inet6_hashfn().
> 
>   include/net/ipv6.h | 8 ++------
>   1 file changed, 2 insertions(+), 6 deletions(-)
> 

applied to oem kernels, thanks
Roxana Nicolescu Aug. 29, 2023, 1:41 p.m. UTC | #3
On 11/08/2023 02:56, Cengiz Can wrote:
> [Impact]
> A hash collision flaw was found in the IPv6 connection lookup table in the
> Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood
> attack. A user located in the local network or with a high bandwidth connection
> can increase the CPU usage of the server that accepts IPV6 connections up to
> 95%.
>
> [Fix]
> Cherry picked from upstream to all kernels.
>
> [Test case]
> Compile and boot tested only.
>
> [Potential regression]
> IPv6 users can be affected, however highly unlikely since the fix only improves
> an inline hash calculation function.
>
> Stewart Smith (1):
>    tcp: Reduce chance of collisions in inet6_hashfn().
>
>   include/net/ipv6.h | 8 ++------
>   1 file changed, 2 insertions(+), 6 deletions(-)
>
Acked-by: Roxana Nicolescu <roxana.nicolescu@canonical.com>
Stefan Bader Aug. 31, 2023, 8:28 a.m. UTC | #4
On 11.08.23 02:56, Cengiz Can wrote:
> [Impact]
> A hash collision flaw was found in the IPv6 connection lookup table in the
> Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood
> attack. A user located in the local network or with a high bandwidth connection
> can increase the CPU usage of the server that accepts IPV6 connections up to
> 95%.
> 
> [Fix]
> Cherry picked from upstream to all kernels.
> 
> [Test case]
> Compile and boot tested only.
> 
> [Potential regression]
> IPv6 users can be affected, however highly unlikely since the fix only improves
> an inline hash calculation function.
> 
> Stewart Smith (1):
>    tcp: Reduce chance of collisions in inet6_hashfn().
> 
>   include/net/ipv6.h | 8 ++------
>   1 file changed, 2 insertions(+), 6 deletions(-)
> 

Applied to lunar,jammy,focal:linux/master-next and 
jammy:linux-hwe-5.19/hwe-5.19-next. Thanks.

-Stefan