{"id":"CVE-2023-52340","details":"The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.","modified":"2026-03-15T22:47:51.257436Z","published":"2024-07-05T02:15:09.747Z","related":["SUSE-SU-2024:0855-1","SUSE-SU-2024:0856-1","SUSE-SU-2024:0857-1","SUSE-SU-2024:0858-1","SUSE-SU-2024:0900-1","SUSE-SU-2024:0900-2","SUSE-SU-2024:0910-1","SUSE-SU-2024:0925-1","SUSE-SU-2024:0926-1","SUSE-SU-2024:0975-1","SUSE-SU-2024:0976-1","SUSE-SU-2024:0977-1","SUSE-SU-2024:1181-1","SUSE-SU-2024:1183-1","SUSE-SU-2024:1184-1","SUSE-SU-2024:1207-1","SUSE-SU-2024:1229-1","SUSE-SU-2024:1236-1","SUSE-SU-2024:1239-1","SUSE-SU-2024:1246-1","SUSE-SU-2024:1248-1","SUSE-SU-2024:1249-1","SUSE-SU-2024:1251-1","SUSE-SU-2024:1252-1","SUSE-SU-2024:1257-1","SUSE-SU-2024:1273-1","SUSE-SU-2024:1274-1","SUSE-SU-2024:1278-1","SUSE-SU-2024:1280-1","SUSE-SU-2024:1288-1","SUSE-SU-2024:1292-1","SUSE-SU-2024:1298-1","SUSE-SU-2024:1299-1","SUSE-SU-2024:1312-1","SUSE-SU-2024:1318-1","SUSE-SU-2024:1362-1","SUSE-SU-2024:1409-1","SUSE-SU-2024:1411-1","SUSE-SU-2024:1669-1","SUSE-SU-2024:1682-1","SUSE-SU-2024:1711-1","SUSE-SU-2024:1749-1","SUSE-SU-2024:2092-1","SUSE-SU-2024:2162-1","SUSE-SU-2024:2207-1","SUSE-SU-2024:2337-1","SUSE-SU-2024:2446-1","SUSE-SU-2024:2722-1","SUSE-SU-2024:2824-1","SUSE-SU-2024:2850-1","SUSE-SU-2024:3379-1","SUSE-SU-2024:3399-1","SUSE-SU-2024:3631-1","SUSE-SU-2024:3694-1","SUSE-SU-2024:3793-1","SUSE-SU-2024:3829-1","SUSE-SU-2024:3852-1","SUSE-SU-2024:4122-1","SUSE-SU-2024:4218-1","SUSE-SU-2024:4234-1","SUSE-SU-2025:0107-1","SUSE-SU-2025:0158-1","SUSE-SU-2025:0261-1","SUSE-SU-2025:0266-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240816-0005/"},{"type":"FIX","url":"https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=af6d10345ca76670c1b7c37799f0d5576ccef277"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"6.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52340.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}