The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
References
Link | Resource |
---|---|
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3 | Mailing List Patch |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277 | Mailing List Patch |
Configurations
History
No history.
Information
Published : 2024-07-05 02:15
Updated : 2024-07-08 16:42
NVD link : CVE-2023-52340
Mitre link : CVE-2023-52340
CVE.ORG link : CVE-2023-52340
JSON object : View
Products Affected
linux
- linux_kernel
CWE