CVE-2023-54056 — Type Confusion in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 86.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
kheaders: Use array declaration instead of char
Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination
and source buffers. Defining kernel_headers_data as "char" would trip
this check. Since these addresses are treated as byte arrays, define
them as arrays (as done everywhere else).
This was seen with:
$ cat /sys/kernel/kheaders.tar.xz >> /dev/null
detected buffer overflow in memcpy
kernel BUG at lib/strin…
Affected Packages4 packages
▶CVEListV5linux/linux43d8ce9d65a54846d378545770991e65838981e0 — 719459877d58c8aced5845c1e5b98d8d87d09197+7
🔴Vulnerability Details
3OSV▶
CVE-2023-54056: In the Linux kernel, the following vulnerability has been resolved: kheaders: Use array declaration instead of char Under CONFIG_FORTIFY_SOURCE, memcp↗2025-12-24
GHSA▶
GHSA-w8p6-7x4v-892g: In the Linux kernel, the following vulnerability has been resolved:
kheaders: Use array declaration instead of char
Under CONFIG_FORTIFY_SOURCE, mem↗2025-12-24