CVE-2023-54146
Double-Free Vulnerability in Linux Kernel x86/kexec Component
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a double-free issue in the Linux kernel's x86 kexec code. Specifically, the elf header buffer was being freed twice due to an unnecessary free call in the error path of the crash_load_segments() function. This could lead to memory corruption or crashes. The fix involved removing the redundant free call because the elf_headers buffer is already freed later by kimage_file_post_load_cleanup().
How can this vulnerability impact me? :
The double-free vulnerability can cause memory corruption, which may lead to system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges if exploited.