A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-54314 | A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup. |
![]() |
USN-6388-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
In order to mitigate this issue, prevent the affected code from being loaded by blacklisting the kernel module "vmxnet3". For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 ~~~ Exploiting this flaw will require CAP_NET_ADMIN access privilege in any user or network namespace. ~~~
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-10T00:05:41.525Z
Reserved: 2023-08-21T16:21:49.200Z
Link: CVE-2023-4459

No data.

Status : Modified
Published: 2023-08-21T19:15:09.373
Modified: 2024-11-21T08:35:12.437
Link: CVE-2023-4459


No data.