CVE-2023-54110 — Integer Overflow or Wraparound in Linux
Severity
6.7MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: rndis_host: Secure rndis_query check against int overflow
Variables off and len typed as uint32 in rndis_query function
are controlled by incoming RNDIS response message thus their
value may be manipulated. Setting off to a unexpectetly large
value will cause the sum with len and 8 to overflow and pass
the implemented validation step. Consequently the response
pointer will be referring to a location past the expected
buff…
Affected Packages4 packages
▶CVEListV5linux/linuxddda08624013e8435e9f7cfc34a35bd7b3520b6d — 55782f6d63a5a3dd3b84c1e0627738fc5b146b4e+8
🔴Vulnerability Details
3GHSA▶
GHSA-cffh-ppgh-4vqx: In the Linux kernel, the following vulnerability has been resolved:
usb: rndis_host: Secure rndis_query check against int overflow
Variables off and↗2025-12-24
OSV▶
CVE-2023-54110: In the Linux kernel, the following vulnerability has been resolved: usb: rndis_host: Secure rndis_query check against int overflow Variables off and l↗2025-12-24