No analysis available yet.
Vendor Workaround
Mitigation for this issue is to skip loading the affected module "vmxnet3" onto the system until the fix is available, this can be done by a blacklist mechanism which will ensure the driver is not loaded at the boot time. ~~~ How do I blacklist a kernel module to prevent it from loading automatically? https://access.redhat.com/solutions/41278 ~~~
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54251 | A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem. |
Ubuntu USN |
USN-6388-1 | Linux kernel vulnerabilities |
Tue, 03 Jun 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8::crb cpe:/o:redhat:enterprise_linux:8::baseos |
|
| References |
|
Mon, 16 Dec 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 |
Sun, 15 Dec 2024 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:enterprise_linux:9::crb cpe:/o:redhat:enterprise_linux:9::baseos |
|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-06T19:44:23.396Z
Reserved: 2023-08-16T17:27:25.909Z
Link: CVE-2023-4387
No data.
Status : Modified
Published: 2023-08-16T19:15:10.087
Modified: 2025-06-03T03:15:25.913
Link: CVE-2023-4387
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN