CVE-2023-53786
dm flakey: fix a crash with invalid table line
Description
In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL pointer dereference: dmsetup create flakey --table \ "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512" Fix the crash by checking if arg_name is non-NULL before comparing it.
INFO
Published Date :
Dec. 9, 2025, 1:16 a.m.
Last Modified :
Dec. 9, 2025, 6:37 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Check if arg_name is non-NULL before comparison.
- Apply the provided kernel patch.
- Update the Linux kernel to the latest version.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2023-53786.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-53786 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-53786
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-53786 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2023-53786 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Dec. 09, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL pointer dereference: dmsetup create flakey --table \ "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512" Fix the crash by checking if arg_name is non-NULL before comparing it. Added Reference https://git.kernel.org/stable/c/12849ed107c0b2869fb775c81208050899006f07 Added Reference https://git.kernel.org/stable/c/337b7af273562b73c46ef77a724604ad139ca762 Added Reference https://git.kernel.org/stable/c/8258d84a7917aeece773716518deadb7ad776cb7 Added Reference https://git.kernel.org/stable/c/83b4e3d878ea6be9aec1d5a1ab177c766c64d1a0 Added Reference https://git.kernel.org/stable/c/98dba02d9a93eec11bffbb93c7c51624290702d2 Added Reference https://git.kernel.org/stable/c/a1e3fffe02e05c05357af91364ac0fc1ed425b5b Added Reference https://git.kernel.org/stable/c/cb874a190f3f7c3c3fa5b979bee7a3b8cc3a19cc Added Reference https://git.kernel.org/stable/c/f76fcb9d43ec014ac4a1bb983768696d5b032df9 Added Reference https://git.kernel.org/stable/c/f95cb1526669ccdf7eb12eefd57a893953e3595f