CVE-2023-53397
Published: September 19, 2025Last modified: September 19, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: modpost: fix off by one in is_executable_section() The > comparison should be >= to prevent an out of bounds array access.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.42-r0) |
| 25 LTS | linux-lts | Not affected (6.6.89-r0) | |
| Stream | linux-lts | Fixed (6.6.58-r0) |
References
- https://git.kernel.org/stable/c/02dc8e8bdbe4412cfcf17ee3873e63fa5a55b957
- https://git.kernel.org/stable/c/3a3f1e573a105328a2cca45a7cfbebabbf5e3192
- https://git.kernel.org/stable/c/5e0424cd8a44b5f480feb06753cdf4e1f248d148
- https://git.kernel.org/stable/c/7ee557590bac154d324de446d1cd0444988bd511
- https://git.kernel.org/stable/c/8b2e77050b91199453bf19d0517b047b7339a9e3
- https://git.kernel.org/stable/c/cade370efe2f9e2a79ea8587506ffe2b51ac6d2b
- https://git.kernel.org/stable/c/cb0cdca5c979bc34c27602e2039562932c2591a4
- https://git.kernel.org/stable/c/dd872d5576cc94528f427c7264c2c438928cc6d2