CVE-2023-54056
Buffer Overflow in Linux Kernel kheaders Causes Kernel Panic
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's kheaders component involves the use of a 'char' declaration for kernel_headers_data, which causes a buffer overflow detection under CONFIG_FORTIFY_SOURCE when memcpy() checks the size of destination and source buffers. The issue arises because these addresses are treated as byte arrays, and defining them as 'char' trips the size check. The fix was to define kernel_headers_data as an array instead of a 'char', preventing the buffer overflow detected during operations like reading /sys/kernel/kheaders.tar.xz.
How can this vulnerability impact me? :
This vulnerability can cause a kernel buffer overflow leading to a kernel BUG and potential system crash or instability when accessing kernel headers, such as reading /sys/kernel/kheaders.tar.xz. This could result in denial of service or system reliability issues.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to read the kernel headers archive and observing if a buffer overflow or kernel BUG occurs. For example, running the command: cat /sys/kernel/kheaders.tar.xz >> /dev/null may trigger the issue, resulting in messages such as 'detected buffer overflow in memcpy' and a kernel BUG at lib/string_helpers.c. Monitoring kernel logs for such errors can help detect the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved, which includes changing the kernel_headers_data declaration from char to an array to avoid buffer overflow in memcpy under CONFIG_FORTIFY_SOURCE. Until an update is applied, avoid operations that read /sys/kernel/kheaders.tar.xz to prevent triggering the bug.