Linux Kernel: RNDIS Host Int Overflow via usb: rndis_host
CVE-2023-54110 Published on December 24, 2025
usb: rndis_host: Secure rndis_query check against int overflow
In the Linux kernel, the following vulnerability has been resolved:
usb: rndis_host: Secure rndis_query check against int overflow
Variables off and len typed as uint32 in rndis_query function
are controlled by incoming RNDIS response message thus their
value may be manipulated. Setting off to a unexpectetly large
value will cause the sum with len and 8 to overflow and pass
the implemented validation step. Consequently the response
pointer will be referring to a location past the expected
buffer boundaries allowing information leakage e.g. via
RNDIS_OID_802_3_PERMANENT_ADDRESS OID.
Products Associated with CVE-2023-54110
stack.watch emails you whenever new vulnerabilities are published in Linux Kernel or Linux Kernel. Just hit a watch button to start following.
Affected Versions
Linux:- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below 55782f6d63a5a3dd3b84c1e0627738fc5b146b4e is affected.
- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below 02ffb4ecf0614c58e3d0e5bfbe99588c9ddc77c0 is affected.
- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below ebe6d2fcf7835f98cdbb1bd5e0414be20c321578 is affected.
- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below 232ef345e5d76e5542f430a29658a85dbef07f0b is affected.
- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below 11cd4ec6359d90b13ffb8f85a9df8637f0cf8d95 is affected.
- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below 39eadaf5611ddd064ad1c53da65c02d2b0fe22a4 is affected.
- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below a713602807f32afc04add331410c77ef790ef77a is affected.
- Version ddda08624013e8435e9f7cfc34a35bd7b3520b6d and below c7dd13805f8b8fc1ce3b6d40f6aff47e66b72ad2 is affected.
- Version 2.6.22 is affected.
- Before 2.6.22 is unaffected.
- Version 4.14.303, <= 4.14.* is unaffected.
- Version 4.19.270, <= 4.19.* is unaffected.
- Version 5.4.229, <= 5.4.* is unaffected.
- Version 5.10.163, <= 5.10.* is unaffected.
- Version 5.15.87, <= 5.15.* is unaffected.
- Version 6.0.19, <= 6.0.* is unaffected.
- Version 6.1.5, <= 6.1.* is unaffected.
- Version 6.2, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.