CVE-2023-52340 — Uncontrolled Resource Consumption in Kernel
Severity
7.5HIGHNVD
OSV8.1
EPSS
0.1%
top 75.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 5
Latest updateAug 14
Description
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages8 packages
Patches
🔴Vulnerability Details
7📋Vendor Advisories
9Microsoft▶
The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily e.g. leading to a denial of service (network is unreachable errors) when IP↗2024-07-09
💬Community
1Bugzilla▶
CVE-2023-52340 kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU↗2024-01-11