CVE-2023-6176

Updated: 2024-02-08 19:57:46.112715

Description:

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 4.7

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 4.7 MEDIUM Ignored 2024-02-02 13:12:34
AlmaLinux 9.2 FIPS kernel 5.14.0 4.7 MEDIUM Ignored 2024-02-02 13:12:34
CentOS 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2023-12-26 13:08:58
CentOS 8.4 ELS kernel 4.18.0 4.7 MEDIUM Released CLSA-2023:1701963303 2023-12-07 13:08:55
CentOS 8.5 ELS kernel 4.18.0 4.7 MEDIUM Released CLSA-2023:1701962635 2023-12-07 13:08:56
CloudLinux 6 ELS kernel 2.6.32 4.7 MEDIUM Needs Triage 2023-11-29 01:28:06
Oracle Linux 6 ELS kernel 2.6.32 4.7 MEDIUM Not Vulnerable 2023-12-26 13:08:58
Ubuntu 16.04 ELS linux 4.4.0 4.7 MEDIUM Not Vulnerable 2023-11-29 08:43:06
Ubuntu 16.04 ELS linux-hwe 4.15.0 4.7 MEDIUM Not Vulnerable 2023-11-29 08:43:07
Ubuntu 18.04 ELS linux 4.15.0 4.7 MEDIUM Not Vulnerable 2023-11-29 08:43:07