CVE-2023-6176

Updated: 2024-09-13 21:15:35.714318

Description:

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 4.7

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 4.7 MEDIUM Released CLSA-2024:1722533082 2024-08-01 14:40:24
AlmaLinux 9.2 FIPS kernel 5.14.0 4.7 MEDIUM Released CLSA-2024:1722530110 2024-08-01 14:40:25
CentOS 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2023-12-26 13:08:58
CentOS 7 ELS kernel 3.10.0 4.7 MEDIUM Ignored 2024-02-26 03:22:06
CentOS 8.4 ELS kernel 4.18.0 4.7 MEDIUM Released CLSA-2023:1701963303 2023-12-07 13:08:55
CentOS 8.5 ELS kernel 4.18.0 4.7 MEDIUM Released CLSA-2023:1701962635 2023-12-07 13:08:56
CentOS Stream 8 ELS kernel 4.18.0 4.7 MEDIUM Ignored 2024-05-10 14:19:09
CloudLinux 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2024-05-08 10:17:39
Oracle Linux 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2023-12-26 13:08:58
Ubuntu 16.04 ELS linux-hwe 4.15.0 4.7 MEDIUM Not Vulnerable 2023-11-29 08:43:07
Total: 12