Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-54056

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
24/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> kheaders: Use array declaration instead of char<br /> <br /> Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination<br /> and source buffers. Defining kernel_headers_data as "char" would trip<br /> this check. Since these addresses are treated as byte arrays, define<br /> them as arrays (as done everywhere else).<br /> <br /> This was seen with:<br /> <br /> $ cat /sys/kernel/kheaders.tar.xz &gt;&gt; /dev/null<br /> <br /> detected buffer overflow in memcpy<br /> kernel BUG at lib/string_helpers.c:1027!<br /> ...<br /> RIP: 0010:fortify_panic+0xf/0x20<br /> [...]<br /> Call Trace:<br /> <br /> ikheaders_read+0x45/0x50 [kheaders]<br /> kernfs_fop_read_iter+0x1a4/0x2f0<br /> ...

Impacto