U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2023-53817 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() During NVMeTCP Authentication a controller can trigger a kernel oops by specifying the 8192 bit Diffie Hellman group and passing a correctly sized, but zeroed Diffie Hellamn value. mpi_cmp_ui() was detecting this if the second parameter was 0, but 1 is passed from dh_is_pubkey_valid(). This causes the null pointer u->d to be dereferenced towards the end of mpi_cmp_ui()


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0fc7147c694394f8a8cbc19570c6bc918cac0906 kernel.org
https://git.kernel.org/stable/c/12ac013ad7ff0df066451e825801d805095b3776 kernel.org
https://git.kernel.org/stable/c/61f5453e9706e99713825594e0c8f9031485fb5f kernel.org
https://git.kernel.org/stable/c/67589d247909043e94d2dd5fb590958e0f99d58d kernel.org
https://git.kernel.org/stable/c/9e47a758b70167c9301d2b44d2569f86c7796f2d kernel.org
https://git.kernel.org/stable/c/ae63e84ffda74267bf7277c38415ba38389229a0 kernel.org
https://git.kernel.org/stable/c/d3ad023a39f1127dcfd331c562673355dc078650 kernel.org
https://git.kernel.org/stable/c/fde791e8a96a64ea7b0ad2440e43586447a209c6 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-53817
NVD Published Date:
12/08/2025
NVD Last Modified:
12/09/2025
Source:
kernel.org