{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54056","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T12:21:05.091Z","datePublished":"2025-12-24T12:23:04.559Z","dateUpdated":"2026-05-11T19:54:38.759Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:54:38.759Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nkheaders: Use array declaration instead of char\n\nUnder CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination\nand source buffers. Defining kernel_headers_data as \"char\" would trip\nthis check. Since these addresses are treated as byte arrays, define\nthem as arrays (as done everywhere else).\n\nThis was seen with:\n\n  $ cat /sys/kernel/kheaders.tar.xz >> /dev/null\n\n  detected buffer overflow in memcpy\n  kernel BUG at lib/string_helpers.c:1027!\n  ...\n  RIP: 0010:fortify_panic+0xf/0x20\n  [...]\n  Call Trace:\n   <TASK>\n   ikheaders_read+0x45/0x50 [kheaders]\n   kernfs_fop_read_iter+0x1a4/0x2f0\n  ..."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/kheaders.c"],"versions":[{"version":"43d8ce9d65a54846d378545770991e65838981e0","lessThan":"719459877d58c8aced5845c1e5b98d8d87d09197","status":"affected","versionType":"git"},{"version":"43d8ce9d65a54846d378545770991e65838981e0","lessThan":"fcd2da2e6bf2640a31a2a5b118b50dc3635c707b","status":"affected","versionType":"git"},{"version":"43d8ce9d65a54846d378545770991e65838981e0","lessThan":"4a07d2d511e2703efd4387891d49e0326f1157f3","status":"affected","versionType":"git"},{"version":"43d8ce9d65a54846d378545770991e65838981e0","lessThan":"b9f6845a492de20679b84bda6b08be347c5819da","status":"affected","versionType":"git"},{"version":"43d8ce9d65a54846d378545770991e65838981e0","lessThan":"d6d1af6b8611801b585c53c0cc63626c8d339e96","status":"affected","versionType":"git"},{"version":"43d8ce9d65a54846d378545770991e65838981e0","lessThan":"82d2e01b95c439fe55fab5e04fc83387c42d3a48","status":"affected","versionType":"git"},{"version":"43d8ce9d65a54846d378545770991e65838981e0","lessThan":"b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/kheaders.c"],"versions":[{"version":"5.2","status":"affected"},{"version":"0","lessThan":"5.2","status":"unaffected","versionType":"semver"},{"version":"5.4.243","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.180","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.111","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.28","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.15","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3.2","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.4.243"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.10.180"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.15.111"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"6.1.28"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"6.2.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"6.3.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"6.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/719459877d58c8aced5845c1e5b98d8d87d09197"},{"url":"https://git.kernel.org/stable/c/fcd2da2e6bf2640a31a2a5b118b50dc3635c707b"},{"url":"https://git.kernel.org/stable/c/4a07d2d511e2703efd4387891d49e0326f1157f3"},{"url":"https://git.kernel.org/stable/c/b9f6845a492de20679b84bda6b08be347c5819da"},{"url":"https://git.kernel.org/stable/c/d6d1af6b8611801b585c53c0cc63626c8d339e96"},{"url":"https://git.kernel.org/stable/c/82d2e01b95c439fe55fab5e04fc83387c42d3a48"},{"url":"https://git.kernel.org/stable/c/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb"}],"title":"kheaders: Use array declaration instead of char","x_generator":{"engine":"bippy-1.2.0"}}}}