The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
References
Configurations
History
04 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2024-07-05 02:15
Updated : 2025-11-04 18:15
NVD link : CVE-2023-52340
Mitre link : CVE-2023-52340
CVE.ORG link : CVE-2023-52340
JSON object : View
Products Affected
linux
- linux_kernel
CWE
