Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-6176
HistoryNov 16, 2023 - 6:15 p.m.

CVE-2023-6176

2023-11-1618:15:07
Debian Security Bug Tracker
security-tracker.debian.org
18
linux
kernel
cryptographic
algorithm
api
null pointer
dereference
flaw
scatterwalk
local user
crash
system
escalate privileges

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

4.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

4.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%