CVE-2023-6176NULL Pointer Dereference in Redhat Enterprise Linux

Severity
4.7MEDIUMNVD
EPSS
0.0%
top 99.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 16
Latest updateApr 3

Description

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.0 | Impact: 3.6

Affected Packages1 packages

Debianlinux/linux_kernel< 5.10.197-1+3

Also affects: Enterprise Linux 8.0, 9.0

Patches

🔴Vulnerability Details

3
OSV
CVE-2023-6176: A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality2023-11-16
CVEList
Kernel: local dos vulnerability in scatterwalk_copychunks2023-11-16
GHSA
GHSA-fq9v-vwjc-pv76: A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality2023-11-16

📋Vendor Advisories

15
Ubuntu
Kernel Live Patch Security Notice2024-04-03
Ubuntu
Linux kernel (Azure) vulnerabilities2024-02-23
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2024-02-15
Ubuntu
Linux kernel (Azure) vulnerabilities2024-02-15
Ubuntu
Linux kernel vulnerabilities2024-02-14

💬Community

1
Bugzilla
CVE-2023-6176 kernel: local dos vulnerability in scatterwalk_copychunks2023-07-03
CVE-2023-6176 — NULL Pointer Dereference in Redhat | cvebase