{"id":"CVE-2023-6176","details":"A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.","modified":"2026-03-13T07:46:35.358105Z","published":"2023-11-16T18:15:07.483Z","related":["ALSA-2024:2394","CGA-g2p8-xhwc-x7hp","MGASA-2023-0328","MGASA-2023-0331","SUSE-SU-2023:4730-1","SUSE-SU-2023:4731-1","SUSE-SU-2023:4732-1","SUSE-SU-2023:4733-1","SUSE-SU-2023:4734-1","SUSE-SU-2023:4782-1","SUSE-SU-2023:4783-1","SUSE-SU-2023:4810-1","SUSE-SU-2023:4811-1","SUSE-SU-2024:0331-1","SUSE-SU-2024:0344-1","SUSE-SU-2024:0348-1","SUSE-SU-2024:0351-1","SUSE-SU-2024:0352-1","SUSE-SU-2024:0358-1","SUSE-SU-2024:0378-1","SUSE-SU-2024:0389-1","SUSE-SU-2024:0395-1","SUSE-SU-2024:0409-1","SUSE-SU-2024:0411-1","SUSE-SU-2024:0414-1","SUSE-SU-2024:0421-1","SUSE-SU-2024:0428-1","USN-6652-1"],"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-6176"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2394"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2950"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3138"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219359"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6176.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}