Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54314 | A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup. |
Ubuntu USN |
USN-6388-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
In order to mitigate this issue, prevent the affected code from being loaded by blacklisting the kernel module "vmxnet3". For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 ~~~ Exploiting this flaw will require CAP_NET_ADMIN access privilege in any user or network namespace. ~~~
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-15T08:17:03.994Z
Reserved: 2023-08-21T16:21:49.200Z
Link: CVE-2023-4459
No data.
Status : Modified
Published: 2023-08-21T19:15:09.373
Modified: 2024-11-21T08:35:12.437
Link: CVE-2023-4459
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN