2023-11-16 19:00:22 +00:00
{
"id" : "CVE-2023-6176" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2023-11-16T18:15:07.483" ,
2024-09-14 02:03:16 +00:00
"lastModified" : "2024-09-14T00:15:12.343" ,
2024-02-01 21:00:30 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-11-16 19:00:22 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system."
2023-11-23 05:00:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Se encontr\u00f3 una falla de desreferencia de puntero nulo en la API del kernel de Linux para la funcionalidad de dispersi\u00f3n del algoritmo criptogr\u00e1fico. Este problema ocurre cuando un usuario construye un paquete malicioso con una configuraci\u00f3n de socket espec\u00edfica, lo que podr\u00eda permitir que un usuario local bloquee el sistema o aumente sus privilegios en el sistema."
2023-11-16 19:00:22 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-11-23 05:00:22 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
2024-02-01 19:00:28 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
2023-11-23 05:00:22 +00:00
"attackVector" : "LOCAL" ,
2024-02-01 19:00:28 +00:00
"attackComplexity" : "HIGH" ,
2023-11-23 05:00:22 +00:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2024-02-01 19:00:28 +00:00
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2023-11-23 05:00:22 +00:00
"availabilityImpact" : "HIGH" ,
2024-02-01 19:00:28 +00:00
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM"
2023-11-23 05:00:22 +00:00
} ,
2024-02-01 19:00:28 +00:00
"exploitabilityScore" : 1.0 ,
"impactScore" : 3.6
2023-11-23 05:00:22 +00:00
} ,
2023-11-16 19:00:22 +00:00
{
"source" : "secalert@redhat.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
2024-02-01 21:00:30 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
2023-11-16 19:00:22 +00:00
"attackVector" : "LOCAL" ,
2024-02-01 21:00:30 +00:00
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
2023-11-16 19:00:22 +00:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
2024-02-01 21:00:30 +00:00
"baseScore" : 4.7 ,
2023-11-16 19:00:22 +00:00
"baseSeverity" : "MEDIUM"
} ,
2024-02-01 21:00:30 +00:00
"exploitabilityScore" : 1.0 ,
2023-11-16 19:00:22 +00:00
"impactScore" : 3.6
}
]
} ,
2023-11-23 05:00:22 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-476"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4CFF558-3C47-480D-A2F0-BABF26042943"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
] ,
2023-11-16 19:00:22 +00:00
"references" : [
2024-04-30 16:03:27 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2394" ,
"source" : "secalert@redhat.com"
} ,
2024-05-22 18:03:22 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2950" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:3138" ,
"source" : "secalert@redhat.com"
} ,
2023-11-16 19:00:22 +00:00
{
"url" : "https://access.redhat.com/security/cve/CVE-2023-6176" ,
2023-11-23 05:00:22 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Third Party Advisory"
]
2023-11-16 19:00:22 +00:00
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2219359" ,
2023-11-23 05:00:22 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Issue Tracking"
]
2023-11-16 19:00:22 +00:00
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066" ,
2023-11-23 05:00:22 +00:00
"source" : "secalert@redhat.com" ,
"tags" : [
"Mailing List" ,
"Patch"
]
2023-11-16 19:00:22 +00:00
}
]
}