CVE-2023-1206
Linux Kernel vulnerability analysis and mitigation

Overview

A hash collision vulnerability (CVE-2023-1206) was discovered in the IPv6 connection lookup table in the Linux kernel's IPv6 functionality. The vulnerability was reported on March 6, 2023, and affects Linux kernel versions prior to 6.5-rc1. This vulnerability impacts systems that accept IPv6 connections and can be exploited through a new kind of SYN flood attack (CVE, Red Hat Bugzilla).

Technical details

The vulnerability allows attackers to force hash collisions in the IPv6 connection lookup table, which significantly increases the cost of lookups in the Linux kernel's networking stack. The issue was fixed in kernel version 6.5-rc1 through a patch that addressed the hash collision mechanism. The fix was merged into the net.git with commit ID d11b0df7ddf1831f3e170972f43186dad520bfcc (Red Hat Bugzilla). The vulnerability has a CVSS 3.1 score of 5.7 (Medium) with vector CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NetApp Advisory).

Impact

When successfully exploited, this vulnerability can cause a significant increase in CPU usage of servers accepting IPv6 connections, potentially up to 95% utilization. This can result in a denial of service condition, particularly affecting systems that handle IPv6 traffic. The attack is most effective when initiated from either the local network or by an attacker with a high bandwidth connection (CVE).

Mitigation and workarounds

For systems that cannot immediately update to a patched kernel version, a temporary workaround is to disable IPv6 functionality where possible. Multiple Linux distributions have released security updates to address this vulnerability, including Red Hat Enterprise Linux, Debian, and Ubuntu. For E-Series SANtricity OS Controller Software 11.x, disabling IPv6 is recommended as a workaround (NetApp Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68753HIGH7.8
  • Linux KernelLinux Kernel
  • linux-oem-6.14
NoYesJan 05, 2026
CVE-2025-68756HIGH7.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug
NoYesJan 05, 2026
CVE-2025-68764MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-rt-64k-core
NoYesJan 05, 2026
CVE-2025-68758MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-nvidia-tegra-5.15
NoYesJan 05, 2026
CVE-2025-68762N/AN/A
  • Linux KernelLinux Kernel
  • linux-aws-fips
NoYesJan 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management