The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
Metrics
Affected Vendors & Products
References
History
Fri, 16 Aug 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 13 Aug 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::nfv cpe:/o:redhat:enterprise_linux:9 |
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-07-05T00:00:00
Updated: 2024-08-16T17:02:37.085Z
Reserved: 2024-01-12T00:00:00
Link: CVE-2023-52340
Vulnrichment
Updated: 2024-08-16T17:02:37.085Z
NVD
Status : Modified
Published: 2024-07-05T02:15:09.747
Modified: 2024-11-21T08:39:35.620
Link: CVE-2023-52340
Redhat