The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
History

Fri, 16 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
References

Tue, 13 Aug 2024 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/a:redhat:enterprise_linux:9::nfv
cpe:/o:redhat:enterprise_linux:9

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-07-05T00:00:00

Updated: 2024-08-16T17:02:37.085Z

Reserved: 2024-01-12T00:00:00

Link: CVE-2023-52340

cve-icon Vulnrichment

Updated: 2024-08-16T17:02:37.085Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-05T02:15:09.747

Modified: 2024-07-08T16:42:51.350

Link: CVE-2023-52340

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-22T00:00:00Z

Links: CVE-2023-52340 - Bugzilla