CVE-2023-53817
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
During NVMeTCP Authentication a controller can trigger a kernel oops by specifying the 8192 bit Diffie Hellman group and passing a correctly sized, but zeroed Diffie Hellamn value. mpi_cmp_ui() was detecting this if the second parameter was 0, but 1 is passed from dh_is_pubkey_valid(). This causes the null pointer u->d to be dereferenced towards the end of mpi_cmp_ui()
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in mpi_cmp_ui() can be triggered by a zeroed Diffie-Hellman value during NVMeTCP Authentication, causing a kernel oops.
Vulnerability
Description
In the Linux kernel, the function mpi_cmp_ui() in the MPI (Multi-Precision Integer) library contains a null pointer dereference vulnerability. The bug occurs when a zeroed MPI value is passed to the function, because the code does not properly handle the case where the internal limb pointer u->d is NULL. This can be triggered during NVMeTCP Authentication when a controller specifies the 8192-bit Diffie Hellman group and provides a correctly sized but zeroed Diffie Hellman value. The function dh_is_pubkey_valid() passes the value 1 as the second parameter to mpi_cmp_ui(), which fails to detect the zeroed input and leads to a dereference of the NULL pointer u->d [1][2].
Exploitation
An attacker with the ability to act as an NVMe over TCP controller can exploit this vulnerability by sending a crafted authentication request that includes a zeroed Diffie Hellman public value. No authentication is required to trigger the vulnerability, as it occurs during the initial authentication handshake. The attack does not require any special privileges beyond network access to the target system running the vulnerable kernel [1][3].
Impact
Successful exploitation causes a kernel oops (a type of crash), leading to a denial of service (DoS) condition on the affected system. The crash can disrupt all services running on the machine and may require a reboot to restore functionality. There is no evidence of code execution or privilege escalation from this vulnerability [1][4].
Mitigation
The vulnerability has been patched in the Linux kernel versions. The fix ensures that mpi_cmp_ui() properly checks for a zeroed MPI value before dereferencing the limb pointer. Users should apply the latest stable kernel updates from their distribution to remediate this issue [1][2][3][4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
89e47a758b7010fc7147c694367589d247909d3ad023a39f112ac013ad7fffde791e8a96aae63e84ffda761f5453e9706Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/0fc7147c694394f8a8cbc19570c6bc918cac0906nvd
- git.kernel.org/stable/c/12ac013ad7ff0df066451e825801d805095b3776nvd
- git.kernel.org/stable/c/61f5453e9706e99713825594e0c8f9031485fb5fnvd
- git.kernel.org/stable/c/67589d247909043e94d2dd5fb590958e0f99d58dnvd
- git.kernel.org/stable/c/9e47a758b70167c9301d2b44d2569f86c7796f2dnvd
- git.kernel.org/stable/c/ae63e84ffda74267bf7277c38415ba38389229a0nvd
- git.kernel.org/stable/c/d3ad023a39f1127dcfd331c562673355dc078650nvd
- git.kernel.org/stable/c/fde791e8a96a64ea7b0ad2440e43586447a209c6nvd
News mentions
0No linked articles in our index yet.