Bug 2219359 (CVE-2023-6176) - CVE-2023-6176 kernel: local dos vulnerability in scatterwalk_copychunks
Summary: CVE-2023-6176 kernel: local dos vulnerability in scatterwalk_copychunks
Status: NEW
Alias: CVE-2023-6176
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Nobody
QA Contact:
Depends On: 2219362 2219363 2250069
Blocks: 2219356
TreeView+ depends on / blocked
Reported: 2023-07-03 10:04 UTC by TEJ RATHI
Modified: 2024-02-01 23:45 UTC (History)
47 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description TEJ RATHI 2023-07-03 10:04:40 UTC
When the attacker carefully constructs the network packet to reach the above path, it will execute scatterwalk_copychunks(walk->src.virt.addr, &walk->in, bsize, 0); At this time, the calculated address is 0xdffffc0000000001, which is an invalid kernel address. Accessing this address will panic the kernel, bringing the system crash.

Comment 8 Alex 2023-11-16 13:42:17 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2250069]

Comment 11 Justin M. Forbes 2023-12-19 22:32:22 UTC
This was fixed for Fedora with the 6.5.4 stable kernel updates.

Note You need to log in before you can comment on or make changes to this bug.