Description
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
Published: 2024-07-05
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3840-1 linux security update
Debian DLA Debian DLA DLA-3841-1 linux-5.10 security update
Ubuntu USN Ubuntu USN USN-6725-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6725-2 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-6726-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6726-2 Linux kernel (IoT) vulnerabilities
Ubuntu USN Ubuntu USN USN-6726-3 Linux kernel (Xilinx ZynqMP) vulnerabilities
History

Tue, 04 Nov 2025 18:30:00 +0000


Thu, 20 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
References

Tue, 13 Aug 2024 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/a:redhat:enterprise_linux:9::nfv
cpe:/o:redhat:enterprise_linux:9

Subscriptions

Linux Linux Kernel
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-04T17:14:06.189Z

Reserved: 2024-01-12T00:00:00.000Z

Link: CVE-2023-52340

cve-icon Vulnrichment

Updated: 2025-11-04T17:14:06.189Z

cve-icon NVD

Status : Modified

Published: 2024-07-05T02:15:09.747

Modified: 2025-11-04T18:15:49.490

Link: CVE-2023-52340

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-22T00:00:00Z

Links: CVE-2023-52340 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses