CVE-2026-23178Classic Buffer Overflow in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() `i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data into `ihid->rawbuf`. The former can come from the userspace in the hidraw driver and is only bounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set `max_buffer_size` field of `struct hid_ll_driver` which we do not). The latter has size determined at runtime by the maximum

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Linuxlinux/linux_kernel5.18.06.1.163+3
Debianlinux/linux_kernel< 6.1.164-1+2
CVEListV5linux/linux85df713377ddc0482071c3e6b64c37bd1e48f1f1f9c9ad89d845f88a1509e9d672f65d234425fde9+5

🔴Vulnerability Details

4
OSV
CVE-2026-23178: In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() `i2c_hid_xfer`2026-02-14
OSV
HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()2026-02-14
CVEList
HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()2026-02-14
GHSA
GHSA-rhhh-mwpc-m2qj: In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() `i2c_hid_xfe2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()2026-02-14
Debian
CVE-2026-23178: linux - In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hi...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23178 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23178 — Classic Buffer Overflow in Linux | cvebase