{"id":"CVE-2023-54146","summary":"x86/kexec: Fix double-free of elf header buffer","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kexec: Fix double-free of elf header buffer\n\nAfter\n\n  b3e34a47f989 (\"x86/kexec: fix memory leak of elf header buffer\"),\n\nfreeing image-\u003eelf_headers in the error path of crash_load_segments()\nis not needed because kimage_file_post_load_cleanup() will take\ncare of that later. And not clearing it could result in a double-free.\n\nDrop the superfluous vfree() call at the error path of\ncrash_load_segments().","modified":"2026-04-02T09:45:37.870151Z","published":"2025-12-24T13:06:58.904Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54146.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4c71a552b97fb4f46eb300224434fe56fcf4f254"},{"type":"WEB","url":"https://git.kernel.org/stable/c/554a880a1fff46dd5a355dec21cd77d542a0ddf2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5bd3c7abeb69fb4133418b846a1c6dc11313d6f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d00dd2f2645dca04cf399d8fc692f3f69b6dd996"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fbdbf8ac333d3d47c0d9ea81d7d445654431d100"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54146.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54146"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"23cf39dccf7653650701a6f39b119e9116a27f1a"},{"fixed":"4c71a552b97fb4f46eb300224434fe56fcf4f254"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8765a423a87d74ef24ea02b43b2728fe4039f248"},{"fixed":"554a880a1fff46dd5a355dec21cd77d542a0ddf2"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b3e34a47f98974d0844444c5121aaff123004e57"},{"fixed":"fbdbf8ac333d3d47c0d9ea81d7d445654431d100"},{"fixed":"5bd3c7abeb69fb4133418b846a1c6dc11313d6f0"},{"fixed":"d00dd2f2645dca04cf399d8fc692f3f69b6dd996"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"115ee42a4c2f26ba2b4ace2668a3f004621f6833"},{"last_affected":"f675e3a9189d84a9324ab45b0cb19906c2bc8fcb"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54146.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.87"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.19"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.19.0"},{"fixed":"6.1.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54146.json"}}],"schema_version":"1.7.5"}