{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54146","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T13:02:52.523Z","datePublished":"2025-12-24T13:06:58.904Z","dateUpdated":"2026-05-11T19:56:22.647Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:56:22.647Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kexec: Fix double-free of elf header buffer\n\nAfter\n\n  b3e34a47f989 (\"x86/kexec: fix memory leak of elf header buffer\"),\n\nfreeing image->elf_headers in the error path of crash_load_segments()\nis not needed because kimage_file_post_load_cleanup() will take\ncare of that later. And not clearing it could result in a double-free.\n\nDrop the superfluous vfree() call at the error path of\ncrash_load_segments()."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/x86/kernel/crash.c"],"versions":[{"version":"23cf39dccf7653650701a6f39b119e9116a27f1a","lessThan":"4c71a552b97fb4f46eb300224434fe56fcf4f254","status":"affected","versionType":"git"},{"version":"8765a423a87d74ef24ea02b43b2728fe4039f248","lessThan":"554a880a1fff46dd5a355dec21cd77d542a0ddf2","status":"affected","versionType":"git"},{"version":"b3e34a47f98974d0844444c5121aaff123004e57","lessThan":"fbdbf8ac333d3d47c0d9ea81d7d445654431d100","status":"affected","versionType":"git"},{"version":"b3e34a47f98974d0844444c5121aaff123004e57","lessThan":"5bd3c7abeb69fb4133418b846a1c6dc11313d6f0","status":"affected","versionType":"git"},{"version":"b3e34a47f98974d0844444c5121aaff123004e57","lessThan":"d00dd2f2645dca04cf399d8fc692f3f69b6dd996","status":"affected","versionType":"git"},{"version":"115ee42a4c2f26ba2b4ace2668a3f004621f6833","status":"affected","versionType":"git"},{"version":"f675e3a9189d84a9324ab45b0cb19906c2bc8fcb","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/x86/kernel/crash.c"],"versions":[{"version":"5.19","status":"affected"},{"version":"0","lessThan":"5.19","status":"unaffected","versionType":"semver"},{"version":"5.15.87","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.19","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.5","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.46","versionEndExcluding":"5.15.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.0.19"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.1.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.17.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.18.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/4c71a552b97fb4f46eb300224434fe56fcf4f254"},{"url":"https://git.kernel.org/stable/c/554a880a1fff46dd5a355dec21cd77d542a0ddf2"},{"url":"https://git.kernel.org/stable/c/fbdbf8ac333d3d47c0d9ea81d7d445654431d100"},{"url":"https://git.kernel.org/stable/c/5bd3c7abeb69fb4133418b846a1c6dc11313d6f0"},{"url":"https://git.kernel.org/stable/c/d00dd2f2645dca04cf399d8fc692f3f69b6dd996"}],"title":"x86/kexec: Fix double-free of elf header buffer","x_generator":{"engine":"bippy-1.2.0"}}}}