CVE-2023-53786NULL Pointer Dereference in Linux

Severity
4.7MEDIUM
No vector
EPSS
0.1%
top 80.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL pointer dereference: dmsetup create flakey --table \ "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512" Fix the crash by checking if arg_name is non-NULL before comparing it.

Affected Packages4 packages

Linuxlinux/linux_kernel3.1.04.14.315+7
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linuxa3998799fb4df0b0af8271a7d50c4269032397aaf95cb1526669ccdf7eb12eefd57a893953e3595f+9
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-53786: In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL p2025-12-09
GHSA
GHSA-7fp9-v4p9-p354: In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL2025-12-09
OSV
dm flakey: fix a crash with invalid table line2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: dm flakey: fix a crash with invalid table line2025-12-09
Debian
CVE-2023-53786: linux - In the Linux kernel, the following vulnerability has been resolved: dm flakey: ...2023