A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-6176 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2219359 | Issue Tracking |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066 | Mailing List Patch |
Information
Published : 2023-11-16 18:15
Updated : 2023-11-23 03:42
NVD link : CVE-2023-6176
Mitre link : CVE-2023-6176
JSON object : View
Products Affected
redhat
- enterprise_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
