VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53817

CVE-2023-53817

Description

In the Linux kernel, the following vulnerability has been resolved:

crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()

During NVMeTCP Authentication a controller can trigger a kernel oops by specifying the 8192 bit Diffie Hellman group and passing a correctly sized, but zeroed Diffie Hellamn value. mpi_cmp_ui() was detecting this if the second parameter was 0, but 1 is passed from dh_is_pubkey_valid(). This causes the null pointer u->d to be dereferenced towards the end of mpi_cmp_ui()

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null pointer dereference in mpi_cmp_ui() can be triggered by a zeroed Diffie-Hellman value during NVMeTCP Authentication, causing a kernel oops.

Vulnerability

Description

In the Linux kernel, the function mpi_cmp_ui() in the MPI (Multi-Precision Integer) library contains a null pointer dereference vulnerability. The bug occurs when a zeroed MPI value is passed to the function, because the code does not properly handle the case where the internal limb pointer u->d is NULL. This can be triggered during NVMeTCP Authentication when a controller specifies the 8192-bit Diffie Hellman group and provides a correctly sized but zeroed Diffie Hellman value. The function dh_is_pubkey_valid() passes the value 1 as the second parameter to mpi_cmp_ui(), which fails to detect the zeroed input and leads to a dereference of the NULL pointer u->d [1][2].

Exploitation

An attacker with the ability to act as an NVMe over TCP controller can exploit this vulnerability by sending a crafted authentication request that includes a zeroed Diffie Hellman public value. No authentication is required to trigger the vulnerability, as it occurs during the initial authentication handshake. The attack does not require any special privileges beyond network access to the target system running the vulnerable kernel [1][3].

Impact

Successful exploitation causes a kernel oops (a type of crash), leading to a denial of service (DoS) condition on the affected system. The crash can disrupt all services running on the machine and may require a reboot to restore functionality. There is no evidence of code execution or privilege escalation from this vulnerability [1][4].

Mitigation

The vulnerability has been patched in the Linux kernel versions. The fix ensures that mpi_cmp_ui() properly checks for a zeroed MPI value before dereferencing the limb pointer. Users should apply the latest stable kernel updates from their distribution to remediate this issue [1][2][3][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.