A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-54314 A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.
Ubuntu USN Ubuntu USN USN-6388-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

In order to mitigate this issue, prevent the affected code from being loaded by blacklisting the kernel module "vmxnet3". For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 ~~~ Exploiting this flaw will require CAP_NET_ADMIN access privilege in any user or network namespace. ~~~

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-10T00:05:41.525Z

Reserved: 2023-08-21T16:21:49.200Z

Link: CVE-2023-4459

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-08-21T19:15:09.373

Modified: 2024-11-21T08:35:12.437

Link: CVE-2023-4459

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-05-14T00:00:00Z

Links: CVE-2023-4459 - Bugzilla

cve-icon OpenCVE Enrichment

No data.