CVE-2023-54110
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: rndis_host: Secure rndis_query check against int overflow
Variables off and len typed as uint32 in rndis_query function are controlled by incoming RNDIS response message thus their value may be manipulated. Setting off to a unexpectetly large value will cause the sum with len and 8 to overflow and pass the implemented validation step. Consequently the response pointer will be referring to a location past the expected buffer boundaries allowing information leakage e.g. via RNDIS_OID_802_3_PERMANENT_ADDRESS OID.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Integer overflow in Linux kernel's rndis_query allows out-of-bounds read, leaking sensitive data via crafted RNDIS response.
Vulnerability
Description
In the Linux kernel's USB RNDIS host driver (rndis_host), the rndis_query function contains an integer overflow vulnerability. The variables off and len, both of type uint32, are derived from an incoming RNDIS response message and are therefore attacker-controlled. By setting off to an unexpectedly large value, the sum off + len + 8 can overflow a 32-bit integer, bypassing the intended bounds check. This allows the response pointer to reference memory beyond the expected buffer boundaries.
Exploitation
An attacker with the ability to send a malicious RNDIS response to a system using the RNDIS host driver can trigger this vulnerability. No authentication is required if the attacker can communicate with the USB RNDIS device (e.g., via a compromised or malicious USB gadget). The overflow occurs during the validation step, enabling the attacker to cause the driver to read from an arbitrary offset within the response buffer or beyond it.
Impact
Successful exploitation leads to an out-of-bounds read, which can leak sensitive kernel memory. The description specifically mentions information leakage via the RNDIS_OID_802_3_PERMANENT_ADDRESS OID, which could expose the device's MAC address or other data stored adjacent to the intended buffer. This information leakage may aid in further attacks or compromise system privacy.
Mitigation
The vulnerability has been fixed in the Linux kernel stable tree. The commits referenced in [1], [2], [3], and [4] address the issue by adding proper overflow checks. Users should update their kernel to a version containing these fixes. No workaround is available; applying the patch is the recommended course of action.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
855782f6d63a502ffb4ecf061ebe6d2fcf783232ef345e5d711cd4ec6359d39eadaf5611da713602807f3c7dd13805f8bVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/02ffb4ecf0614c58e3d0e5bfbe99588c9ddc77c0nvd
- git.kernel.org/stable/c/11cd4ec6359d90b13ffb8f85a9df8637f0cf8d95nvd
- git.kernel.org/stable/c/232ef345e5d76e5542f430a29658a85dbef07f0bnvd
- git.kernel.org/stable/c/39eadaf5611ddd064ad1c53da65c02d2b0fe22a4nvd
- git.kernel.org/stable/c/55782f6d63a5a3dd3b84c1e0627738fc5b146b4envd
- git.kernel.org/stable/c/a713602807f32afc04add331410c77ef790ef77anvd
- git.kernel.org/stable/c/c7dd13805f8b8fc1ce3b6d40f6aff47e66b72ad2nvd
- git.kernel.org/stable/c/ebe6d2fcf7835f98cdbb1bd5e0414be20c321578nvd
News mentions
0No linked articles in our index yet.