cve/2023/CVE-2023-52340.md

18 lines
730 B
Markdown
Raw Permalink Normal View History

2024-07-25 21:25:12 +00:00
### [CVE-2023-52340](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
### POC
#### Reference
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
#### Github
No PoCs found on GitHub currently.