The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52340.json"