CVE-2023-4387: Kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf()

Description

A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.

Classification

CVE ID: CVE-2023-4387

Affected Products

Vendor: Red Hat

Product: Red Hat Enterprise Linux 9

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 5.08% (scored less or equal to compared to others)

EPSS Date: 2025-02-04 (when was this score calculated)

References

https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2023-4387
https://bugzilla.redhat.com/show_bug.cgi?id=2219270
https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8

Timeline