First published: Sun Oct 15 2023(Updated: )
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <6.5.3 | |
redhat/Kernel | <6.6 | 6.6 |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
IBM Security Guardium | <=12.0 | |
Linux Linux kernel | >=3.4<4.14.326 | |
Linux Linux kernel | >=4.15<4.19.295 | |
Linux Linux kernel | >=4.20<5.4.257 | |
Linux Linux kernel | >=5.5<5.10.195 | |
Linux Linux kernel | >=5.11<5.15.132 | |
Linux Linux kernel | >=5.16<6.1.53 | |
Linux Linux kernel | >=6.2<6.4.16 | |
Linux Linux kernel | >=6.5<6.5.3 | |
Debian Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45871 is an issue in the IGB driver in the Linux kernel before 6.5.3.
The severity of CVE-2023-45871 is critical with a score of 9.8.
CVE-2023-45871 affects the Linux kernel before version 6.5.3.
To fix CVE-2023-45871, update your Linux kernel to version 6.5.3 or later.
The Common Weakness Enumeration (CWE) for CVE-2023-45871 is CWE-120 (Buffer Copy without Checking Size of Input).