CVE-2023-52340

Updated: 2025-03-21 01:02:26.948708

Description:

The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.5 HIGH Already Fixed 2024-08-26 14:32:46
CentOS 6 ELS kernel 2.6.32 7.5 HIGH Released CLSA-2024:1724774331 2024-09-09 12:20:24
CentOS 7 ELS kernel 3.10.0 7.5 HIGH Released CLSA-2024:1724693366 2024-09-09 12:20:20
CentOS 8.4 ELS kernel 4.18.0 7.5 HIGH Released CLSA-2024:1725872696 2024-09-09 05:33:03
CentOS 8.5 ELS kernel 4.18.0 7.5 HIGH Released CLSA-2024:1725876080 2024-09-09 12:23:38
CentOS Stream 8 ELS kernel 4.18.0 7.5 HIGH Needs Triage 2025-07-07 16:31:50
CloudLinux 6 ELS kernel 2.6.32 7.5 HIGH Ignored 2025-01-10 22:44:00
Oracle Linux 6 ELS kernel 2.6.32 7.5 HIGH Released CLSA-2024:1725187614 2024-09-01 12:18:35
RHEL 7 ELS kernel 3.10.0 7.5 HIGH Released CLSA-2025:1750353839 2025-06-20 00:27:50
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.5 HIGH Released CLSA-2024:1713791701 2024-04-22 11:10:56
Total: 12