VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54110

CVE-2023-54110

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: rndis_host: Secure rndis_query check against int overflow

Variables off and len typed as uint32 in rndis_query function are controlled by incoming RNDIS response message thus their value may be manipulated. Setting off to a unexpectetly large value will cause the sum with len and 8 to overflow and pass the implemented validation step. Consequently the response pointer will be referring to a location past the expected buffer boundaries allowing information leakage e.g. via RNDIS_OID_802_3_PERMANENT_ADDRESS OID.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Integer overflow in Linux kernel's rndis_query allows out-of-bounds read, leaking sensitive data via crafted RNDIS response.

Vulnerability

Description

In the Linux kernel's USB RNDIS host driver (rndis_host), the rndis_query function contains an integer overflow vulnerability. The variables off and len, both of type uint32, are derived from an incoming RNDIS response message and are therefore attacker-controlled. By setting off to an unexpectedly large value, the sum off + len + 8 can overflow a 32-bit integer, bypassing the intended bounds check. This allows the response pointer to reference memory beyond the expected buffer boundaries.

Exploitation

An attacker with the ability to send a malicious RNDIS response to a system using the RNDIS host driver can trigger this vulnerability. No authentication is required if the attacker can communicate with the USB RNDIS device (e.g., via a compromised or malicious USB gadget). The overflow occurs during the validation step, enabling the attacker to cause the driver to read from an arbitrary offset within the response buffer or beyond it.

Impact

Successful exploitation leads to an out-of-bounds read, which can leak sensitive kernel memory. The description specifically mentions information leakage via the RNDIS_OID_802_3_PERMANENT_ADDRESS OID, which could expose the device's MAC address or other data stored adjacent to the intended buffer. This information leakage may aid in further attacks or compromise system privacy.

Mitigation

The vulnerability has been fixed in the Linux kernel stable tree. The commits referenced in [1], [2], [3], and [4] address the issue by adding proper overflow checks. Users should update their kernel to a version containing these fixes. No workaround is available; applying the patch is the recommended course of action.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.