Out-of-bounds Read The advisory has been revoked - it doesn't affect any version of package kernel-rt-64k-modules-partner  (opens in a new tab)


Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS9-KERNELRT64KMODULESPARTNER-12943843
  • published19 Sept 2025
  • disclosed18 Sept 2025

Introduced: 18 Sep 2025

CVE-2023-53397  (opens in a new tab)
CWE-125  (opens in a new tab)

Amendment

The Centos security team deemed this advisory irrelevant for Centos:9.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-rt-64k-modules-partner package and not the kernel-rt-64k-modules-partner package as distributed by Centos.

In the Linux kernel, the following vulnerability has been resolved:

modpost: fix off by one in is_executable_section()

The > comparison should be >= to prevent an out of bounds array access.