CVE-2023-6176

Updated: 2025-08-20 00:25:35.823248

Description:

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 4.7

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 4.7 MEDIUM Released CLSA-2025:1743193221 2024-08-01 14:40:25
CentOS 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2023-12-26 13:08:58
CentOS 7 ELS kernel 3.10.0 4.7 MEDIUM Ignored 2024-02-26 03:22:06 Ignored due to low severity
CentOS 8.4 ELS kernel 4.18.0 4.7 MEDIUM Released CLSA-2023:1701963303 2023-12-07 13:08:55
CentOS 8.5 ELS kernel 4.18.0 4.7 MEDIUM Released CLSA-2023:1701962635 2023-12-07 13:08:56
CentOS Stream 8 ELS kernel 4.18.0 4.7 MEDIUM Ignored 2024-05-10 14:19:09 Ignored due to low severity
CloudLinux 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2024-05-08 10:17:39
Oracle Linux 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2023-12-26 13:08:58
Ubuntu 16.04 ELS linux-hwe 4.15.0 4.7 MEDIUM Not Vulnerable 2023-11-29 08:43:07
Ubuntu 16.04 ELS linux 4.4.0 4.7 MEDIUM Not Vulnerable 2023-11-29 08:43:06
Total: 11