The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3840-1 | linux security update |
Debian DLA |
DLA-3841-1 | linux-5.10 security update |
Ubuntu USN |
USN-6725-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6725-2 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6726-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6726-2 | Linux kernel (IoT) vulnerabilities |
Ubuntu USN |
USN-6726-3 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 20 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Aug 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 13 Aug 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::nfv cpe:/o:redhat:enterprise_linux:9 |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T17:14:06.189Z
Reserved: 2024-01-12T00:00:00.000Z
Link: CVE-2023-52340
Updated: 2025-11-04T17:14:06.189Z
Status : Modified
Published: 2024-07-05T02:15:09.747
Modified: 2025-11-04T18:15:49.490
Link: CVE-2023-52340
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN