Vulnerability Description
In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.1.2 |
Related Weaknesses (CWE)
References
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2Release Notes
- https://github.com/torvalds/linux/commit/45af1d7aae7d5520d2858f8517a1342646f015dPatch
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2Release Notes
- https://github.com/torvalds/linux/commit/45af1d7aae7d5520d2858f8517a1342646f015dPatch
FAQ
What is CVE-2023-22997?
CVE-2023-22997 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
How severe is CVE-2023-22997?
CVE-2023-22997 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-22997?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.