CVE-2023-52340

Updated: 2026-02-27 03:31:57.814973

Description:

The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.5 HIGH Already Fixed 2024-08-26 14:32:46
CentOS 6 ELS kernel 2.6.32 7.5 HIGH Released CLSA-2024:1724774331 2024-09-09 12:20:24
CentOS 7 ELS kernel 3.10.0 7.5 HIGH Released CLSA-2024:1724693366 2024-09-09 12:20:20
CentOS 8.4 ELS kernel 4.18.0 7.5 HIGH Released CLSA-2024:1725872696 2024-09-09 05:33:03
CentOS 8.5 ELS kernel 4.18.0 7.5 HIGH Released CLSA-2024:1725876080 2024-09-09 12:23:38
CentOS Stream 8 ELS kernel 4.18.0 7.5 HIGH Already Fixed 2025-07-22 00:48:38
CloudLinux 6 ELS kernel 2.6.32 7.5 HIGH Ignored 2025-01-10 22:44:00
Oracle Linux 6 ELS kernel 2.6.32 7.5 HIGH Released CLSA-2024:1725187614 2024-09-01 12:18:35
RHEL 7 ELS kernel 3.10.0 7.5 HIGH Released CLSA-2025:1750353839 2025-06-20 00:27:50
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.5 HIGH Released CLSA-2024:1713791701 2024-04-22 11:10:56
Total: 12