Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-6176
HistoryNov 16, 2023 - 12:00 a.m.

CVE-2023-6176

2023-11-1600:00:00
ubuntu.com
ubuntu.com
21
cve-2023-6176
linux kernel
cryptographic algorithm scatterwalk
null pointer dereference
privilege escalation

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A null pointer dereference flaw was found in the Linux kernel API for the
cryptographic algorithm scatterwalk functionality. This issue occurs when a
user constructs a malicious packet with specific socket configuration,
which could allow a local user to crash the system or escalate their
privileges on the system.

Bugs

Notes

Author Note
Priority reason: Possible privilege escalation issue
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchlinux< 5.4.0-169.187UNKNOWN
ubuntu22.04noarchlinux< 5.15.0-94.104UNKNOWN
ubuntu23.10noarchlinux< 6.5.0-17.17UNKNOWN
ubuntu20.04noarchlinux-aws< 5.4.0-1116.126UNKNOWN
ubuntu22.04noarchlinux-aws< 5.15.0-1053.58UNKNOWN
ubuntu23.10noarchlinux-aws< 6.5.0-1013.13UNKNOWN
ubuntu20.04noarchlinux-aws-5.15< 5.15.0-1053.58~20.04.1UNKNOWN
ubuntu18.04noarchlinux-aws-5.4< 5.4.0-1116.126~18.04.1UNKNOWN
ubuntu20.04noarchlinux-azure< 5.4.0-1121.128UNKNOWN
ubuntu22.04noarchlinux-azure< 5.15.0-1056.64UNKNOWN
Rows per page:
1-10 of 601

References

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%