In the Linux kernel, the following vulnerability has been resolved:
modpost: fix off by one in is_executable_section()
The > comparison should be >= to prevent an out of bounds array
access.
References
Configurations
Configuration 1 (hide)
|
History
12 Dec 2025, 20:38
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-193 | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/02dc8e8bdbe4412cfcf17ee3873e63fa5a55b957 - Patch | |
| References | () https://git.kernel.org/stable/c/3a3f1e573a105328a2cca45a7cfbebabbf5e3192 - Patch | |
| References | () https://git.kernel.org/stable/c/5e0424cd8a44b5f480feb06753cdf4e1f248d148 - Patch | |
| References | () https://git.kernel.org/stable/c/7ee557590bac154d324de446d1cd0444988bd511 - Patch | |
| References | () https://git.kernel.org/stable/c/8b2e77050b91199453bf19d0517b047b7339a9e3 - Patch | |
| References | () https://git.kernel.org/stable/c/cade370efe2f9e2a79ea8587506ffe2b51ac6d2b - Patch | |
| References | () https://git.kernel.org/stable/c/cb0cdca5c979bc34c27602e2039562932c2591a4 - Patch | |
| References | () https://git.kernel.org/stable/c/dd872d5576cc94528f427c7264c2c438928cc6d2 - Patch |
18 Sep 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-18 14:15
Updated : 2026-01-14 19:16
NVD link : CVE-2023-53397
Mitre link : CVE-2023-53397
CVE.ORG link : CVE-2023-53397
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-193
Off-by-one Error
