A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6176.json"
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@cfaa80c91f6f99b9342b6557f0f0e1143e434066",
"digest": {
"length": 2467.0,
"function_hash": "111617552289918809512148600629991841343"
},
"id": "CVE-2023-6176-739cf102",
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c",
"function": "bpf_exec_tx_verdict"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@cfaa80c91f6f99b9342b6557f0f0e1143e434066",
"digest": {
"line_hashes": [
"41741217323073572108893103115469683313",
"221000609046974303911688960205402607263",
"214042752916362515416877594221012639323",
"3862337142195134359596057636293549390",
"20005229507579059033295883355497932531",
"162570544772978484485165068753878402761",
"214042752916362515416877594221012639323",
"3862337142195134359596057636293549390"
],
"threshold": 0.9
},
"id": "CVE-2023-6176-e0a9b424",
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/tls/tls_sw.c"
}
}
]