A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-6176.json"
[
{
"id": "CVE-2023-6176-739cf102",
"signature_type": "Function",
"digest": {
"function_hash": "111617552289918809512148600629991841343",
"length": 2467.0
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@cfaa80c91f6f99b9342b6557f0f0e1143e434066",
"target": {
"function": "bpf_exec_tx_verdict",
"file": "net/tls/tls_sw.c"
},
"deprecated": false
},
{
"id": "CVE-2023-6176-e0a9b424",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"41741217323073572108893103115469683313",
"221000609046974303911688960205402607263",
"214042752916362515416877594221012639323",
"3862337142195134359596057636293549390",
"20005229507579059033295883355497932531",
"162570544772978484485165068753878402761",
"214042752916362515416877594221012639323",
"3862337142195134359596057636293549390"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@cfaa80c91f6f99b9342b6557f0f0e1143e434066",
"target": {
"file": "net/tls/tls_sw.c"
},
"deprecated": false
}
]