CVE-2023-54056
Unknown Unknown - Not Provided
Buffer Overflow in Linux Kernel kheaders Causes Kernel Panic

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: kheaders: Use array declaration instead of char Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination and source buffers. Defining kernel_headers_data as "char" would trip this check. Since these addresses are treated as byte arrays, define them as arrays (as done everywhere else). This was seen with: $ cat /sys/kernel/kheaders.tar.xz >> /dev/null detected buffer overflow in memcpy kernel BUG at lib/string_helpers.c:1027! ... RIP: 0010:fortify_panic+0xf/0x20 [...] Call Trace: <TASK> ikheaders_read+0x45/0x50 [kheaders] kernfs_fop_read_iter+0x1a4/0x2f0 ...
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's kheaders component involves the use of a 'char' declaration for kernel_headers_data, which causes a buffer overflow detection under CONFIG_FORTIFY_SOURCE when memcpy() checks the size of destination and source buffers. The issue arises because these addresses are treated as byte arrays, and defining them as 'char' trips the size check. The fix was to define kernel_headers_data as an array instead of a 'char', preventing the buffer overflow detected during operations like reading /sys/kernel/kheaders.tar.xz.


How can this vulnerability impact me? :

This vulnerability can cause a kernel buffer overflow leading to a kernel BUG and potential system crash or instability when accessing kernel headers, such as reading /sys/kernel/kheaders.tar.xz. This could result in denial of service or system reliability issues.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to read the kernel headers archive and observing if a buffer overflow or kernel BUG occurs. For example, running the command: cat /sys/kernel/kheaders.tar.xz >> /dev/null may trigger the issue, resulting in messages such as 'detected buffer overflow in memcpy' and a kernel BUG at lib/string_helpers.c. Monitoring kernel logs for such errors can help detect the vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, which includes changing the kernel_headers_data declaration from char to an array to avoid buffer overflow in memcpy under CONFIG_FORTIFY_SOURCE. Until an update is applied, avoid operations that read /sys/kernel/kheaders.tar.xz to prevent triggering the bug.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart