The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/dxdxdt/rsrca
- https://github.com/fkie-cad/nvd-json-data-feeds