Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2023-54110

kernel: usb: rndis_host: Secure rndis_query check against int overflow (important)
Back to all
CVE

CVE-2023-54110

kernel: usb: rndis_host: Secure rndis_query check against int overflow (important)

DOCUMENTATION: The CVE program describes this issue as: In the Linux kernel, the following vulnerability has been resolved:

usb: rndishost: Secure rndisquery check against int overflow

Variables off and len typed as uint32 in rndis_query function

are controlled by incoming RNDIS response message thus their

value may be manipulated. Setting off to a unexpectetly large

value will cause the sum with len and 8 to overflow and pass

the implemented validation step. Consequently the response

pointer will be referring to a location past the expected

buffer boundaries allowing information leakage e.g. via

RNDISOID8023PERMANENT_ADDRESS OID.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
0
-
C
H
U
-
C
H
U
-

Related Resources

No items found.

References

https://access.redhat.com/security/cve/CVE-2023-54110

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0.00032%
EPSS Percentile
0.08835%
Introduced Version
0
Fix Available
6.1.7-1,5.10.178-1,0:4.15.0-208.220,0:5.4.0-144.161~18.04.1,0:4.15.0-1137.142,0:4.15.0-1153.166,0:5.4.0-1097.105~18.04.1,0:4.15.0-1162.177,0:5.4.0-1104.110~18.04.1,0:4.15.0-1147.163,0:5.4.0-1101.110~18.04.1,0:5.4.0-1045.50~18.04.1,0:4.15.0-1116.127,0:5.4.0-1094.103~18.04.1,0:5.4.0-1081.92~18.04.1,0:5.4.0-144.161,0:5.15.0-69.76~20.04.1,0:5.4.0-1087.93,0:5.4.0-1097.105,0:5.15.0-1033.37~20.04.1,0:5.4.0-1104.110,0:5.15.0-1035.42~20.04.1,0:5.4.0-1059.65,0:5.4.0-1101.110,0:5.15.0-1031.38~20.04.1,0:5.4.0-1045.50,0:5.15.0-1027.32~20.04.1,0:5.4.0-1013.15,0:5.15.0-1014.14~20.04.1,0:5.4.0-1094.103,0:5.15.0-1032.38~20.04.1,0:5.4.0-1081.92,0:5.4.0-1022.26,0:5.15.0-69.76,0:5.15.0-1030.35,0:5.15.0-1033.37,0:5.15.0-1035.42,0:5.15.0-1031.38,0:5.15.0-1017.22,0:5.15.0-1027.30,0:5.15.0-1027.32,0:5.15.0-1023.23,0:5.15.0-1032.38,0:5.15.0-1026.28

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading