Impact
NetBSD's cryptodev_op function has a signed integer overflow when the destination length supplied by an attacker exceeds INT_MAX. This overflow corrupts the value used in subsequent pointer arithmetic, leading to a NULL pointer dereference and a kernel panic. The flaw is classified under CWE‑190 and involves a null pointer dereference (CWE‑476).
Affected Systems
All NetBSD systems running a kernel built from source that predates the commit ec8451e are affected. The vulnerable code resides in sys/opencrypto/cryptodev.c, so any installation that provides the /dev/crypto device and supports compression session types is susceptible.
Risk and Exploitability
The CVSS score of 5.7 reflects a moderate severity. The exploit requires local access to /dev/crypto and an ability to create a compression session; it does not provide remote code execution or persistence. Because the flaw only causes a kernel crash, the main risk is a denial‑of‑service, which can be disruptive in shared or production environments. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment