-
CVE-2023-53817
- EPSS 0.05%
- Veröffentlicht 09.12.2025 00:01:15
- Zuletzt bearbeitet 09.12.2025 18:37:13
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() During NVMeTCP Authentication a controller can trigger a kernel oops by specifying the 8192 bit Diffie Hellman group and passing a correctly sized, but zeroed Diffie Hellamn value. mpi_cmp_ui() was detecting this if the second parameter was 0, but 1 is passed from dh_is_pubkey_valid(). This causes the null pointer u->d to be dereferenced towards the end of mpi_cmp_ui()
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
fde791e8a96a64ea7b0ad2440e43586447a209c6
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
ae63e84ffda74267bf7277c38415ba38389229a0
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
61f5453e9706e99713825594e0c8f9031485fb5f
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
0fc7147c694394f8a8cbc19570c6bc918cac0906
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
67589d247909043e94d2dd5fb590958e0f99d58d
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
d3ad023a39f1127dcfd331c562673355dc078650
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
12ac013ad7ff0df066451e825801d805095b3776
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
Version <
9e47a758b70167c9301d2b44d2569f86c7796f2d
Version
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version <=
4.14.*
Version
4.14.326
Status
unaffected
Version <=
4.19.*
Version
4.19.295
Status
unaffected
Version <=
5.4.*
Version
5.4.257
Status
unaffected
Version <=
5.10.*
Version
5.10.197
Status
unaffected
Version <=
5.15.*
Version
5.15.133
Status
unaffected
Version <=
6.1.*
Version
6.1.55
Status
unaffected
Version <=
6.5.*
Version
6.5.5
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.14 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|