CVE-2023-45871

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability exists in the Intel IGB Ethernet driver in Linux kernels before 6.5.3. When processing frames larger than the configured MTU, inadequate buffer sizing can lead to memory corruption. This affects systems using the igb driver for Intel Gigabit network adapters.

💻 Affected Systems

Products:
  • Linux kernel with igb driver
Versions: Linux kernel versions before 6.5.3
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Intel IGB Ethernet adapters with the igb driver loaded. Requires network traffic with frames larger than MTU.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, or potential arbitrary code execution with kernel privileges resulting in complete system compromise.

🟠

Likely Case

System instability, kernel crashes, or denial of service due to memory corruption when processing oversized network frames.

🟢

If Mitigated

Minimal impact if systems are patched or network controls prevent oversized frames from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM - Requires specially crafted network traffic, but internet-facing systems could receive malicious packets.
🏢 Internal Only: MEDIUM - Internal systems could be targeted by malicious actors on the same network segment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted network packets. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 6.5.3 and later

Vendor Advisory: https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3

Restart Required: Yes

Instructions:

1. Update Linux kernel to version 6.5.3 or later. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable IGB driver

linux

Remove or blacklist the igb kernel module to prevent loading

echo 'blacklist igb' >> /etc/modprobe.d/blacklist-igb.conf
rmmod igb

Configure MTU limits

linux

Use network filtering to block frames larger than standard MTU

iptables -A INPUT -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems with IGB adapters
  • Deploy network intrusion prevention systems to detect and block oversized frames

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if igb module is loaded: uname -r && lsmod | grep igb

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is 6.5.3 or later: uname -r

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/kern.log or dmesg
  • Network interface errors or resets

Network Indicators:

  • Unusual oversized network packets targeting port 0 or raw sockets

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "igb")

🔗 References

📤 Share & Export