In the Linux kernel, the following vulnerability has been resolved:
modpost: fix off by one in isexecutablesection()
The > comparison should be >= to prevent an out of bounds array access.
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd872d5576cc94528f427c7264c2c438928cc6d2",
"id": "CVE-2023-53397-0dfd03b4",
"digest": {
"function_hash": "214715562216365695836778538356271061233",
"length": 254.0
},
"target": {
"function": "is_executable_section",
"file": "scripts/mod/modpost.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02dc8e8bdbe4412cfcf17ee3873e63fa5a55b957",
"id": "CVE-2023-53397-20ead328",
"digest": {
"function_hash": "214715562216365695836778538356271061233",
"length": 254.0
},
"target": {
"function": "is_executable_section",
"file": "scripts/mod/modpost.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb0cdca5c979bc34c27602e2039562932c2591a4",
"id": "CVE-2023-53397-471db0de",
"digest": {
"threshold": 0.9,
"line_hashes": [
"156621589309281727141779120063329004763",
"340105879484311256254429611135237802189",
"145567395681529624041813127871373913039",
"211091279274258626594833862862626768618"
]
},
"target": {
"file": "scripts/mod/modpost.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cade370efe2f9e2a79ea8587506ffe2b51ac6d2b",
"id": "CVE-2023-53397-6a167bbb",
"digest": {
"function_hash": "214715562216365695836778538356271061233",
"length": 254.0
},
"target": {
"function": "is_executable_section",
"file": "scripts/mod/modpost.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@02dc8e8bdbe4412cfcf17ee3873e63fa5a55b957",
"id": "CVE-2023-53397-94132944",
"digest": {
"threshold": 0.9,
"line_hashes": [
"156621589309281727141779120063329004763",
"340105879484311256254429611135237802189",
"145567395681529624041813127871373913039",
"211091279274258626594833862862626768618"
]
},
"target": {
"file": "scripts/mod/modpost.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dd872d5576cc94528f427c7264c2c438928cc6d2",
"id": "CVE-2023-53397-c655cf01",
"digest": {
"threshold": 0.9,
"line_hashes": [
"156621589309281727141779120063329004763",
"340105879484311256254429611135237802189",
"145567395681529624041813127871373913039",
"211091279274258626594833862862626768618"
]
},
"target": {
"file": "scripts/mod/modpost.c"
},
"signature_type": "Line",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cb0cdca5c979bc34c27602e2039562932c2591a4",
"id": "CVE-2023-53397-ce235ee4",
"digest": {
"function_hash": "214715562216365695836778538356271061233",
"length": 254.0
},
"target": {
"function": "is_executable_section",
"file": "scripts/mod/modpost.c"
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cade370efe2f9e2a79ea8587506ffe2b51ac6d2b",
"id": "CVE-2023-53397-e655859c",
"digest": {
"threshold": 0.9,
"line_hashes": [
"156621589309281727141779120063329004763",
"340105879484311256254429611135237802189",
"145567395681529624041813127871373913039",
"211091279274258626594833862862626768618"
]
},
"target": {
"file": "scripts/mod/modpost.c"
},
"signature_type": "Line",
"signature_version": "v1"
}
]