A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.
Workaround:
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:0412 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1250 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1306 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1367 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1382 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2006 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2008 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-4459 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2219268 | patch issue tracking |
https://github.com/torvalds/linux/commit/edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd | patch |