{"id":"CVE-2023-3772","details":"A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.","modified":"2026-04-16T00:07:00.458065531Z","published":"2023-07-25T16:15:11.660Z","related":["ALSA-2023:7077","CGA-53xq-6pp4-5v7f","SUSE-SU-2023:3599-1","SUSE-SU-2023:3599-2","SUSE-SU-2023:3600-1","SUSE-SU-2023:3600-2","SUSE-SU-2023:3601-1","SUSE-SU-2023:3656-1","SUSE-SU-2023:3680-1","SUSE-SU-2023:3681-1","SUSE-SU-2023:3682-1","SUSE-SU-2023:3684-1","SUSE-SU-2023:3687-1","SUSE-SU-2023:3705-1","SUSE-SU-2023:3785-1","SUSE-SU-2023:3964-1","SUSE-SU-2023:3969-1","SUSE-SU-2023:3971-1","SUSE-SU-2023:3988-1","SUSE-SU-2023:4028-1","SUSE-SU-2025:03600-1","SUSE-SU-2025:03613-1","SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03626-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4315-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/08/10/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/08/10/3"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0575"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-3772"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5492"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218943"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-3772.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}