MEDIUM · 5.5

CVE-2023-3772

A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointe...

Vulnerability Description

A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.

CVSS Score

5.5

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
RedhatEnterprise Linux8.0
RedhatEnterprise Linux For Real Time8.0
RedhatEnterprise Linux For Real Time For Nfv8.0
FedoraprojectFedora-
LinuxLinux Kernel-
DebianDebian Linux10.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-3772?

CVE-2023-3772 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointe...

How severe is CVE-2023-3772?

CVE-2023-3772 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-3772?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux, Redhat Enterprise Linux For Real Time, Redhat Enterprise Linux For Real Time For Nfv, Fedoraproject Fedora, Linux Linux Kernel.