First published: Mon Jan 22 2024(Updated: )
Last updated 18 February 2025
Credit: security@xen.org security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=4.14<4.19.306 | |
Linux kernel | >=4.20<5.4.268 | |
Linux kernel | >=5.5<5.10.209 | |
Linux kernel | >=5.11<5.15.148 | |
Linux kernel | >=5.16<6.1.75 | |
Linux kernel | >=6.2<6.6.14 | |
Linux kernel | >=6.7<6.7.2 | |
Fedora | =38 | |
Fedora | =39 | |
Debian | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46838 has been classified with a critical severity level due to potential exploitation in virtual network protocols.
To fix CVE-2023-46838, upgrade the Linux kernel to a patched version such as 5.10.223-1 or later.
CVE-2023-46838 affects various versions of the Linux kernel, including 4.14 through 6.7.
Currently, there are no documented workarounds for CVE-2023-46838 other than upgrading to a fixed version of the kernel.
Exploiting CVE-2023-46838 could lead to remote code execution or denial of service within the virtual network.