CVE-2023-53817
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() During NVMeTCP Authentication a controller can trigger a kernel oops by specifying the 8192 bit Diffie Hellman group and passing a correctly sized, but zeroed Diffie Hellamn value. mpi_cmp_ui() was detecting this if the second parameter was 0, but 1 is passed from dh_is_pubkey_valid(). This causes the null pointer u->d to be dereferenced towards the end of mpi_cmp_ui()
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's crypto library, specifically in the mpi_cmp_ui() function. During NVMeTCP Authentication, a controller can cause a kernel crash (kernel oops) by specifying an 8192 bit Diffie Hellman group and providing a correctly sized but zeroed Diffie Hellman value. The function mpi_cmp_ui() incorrectly handles this case because it expects a different parameter value, leading to a null pointer dereference and kernel crash.


How can this vulnerability impact me? :

This vulnerability can cause a denial of service by crashing the Linux kernel during NVMeTCP Authentication. An attacker controlling the NVMeTCP controller could exploit this to trigger a kernel oops, potentially disrupting system availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart