CVE-2026-23178
Buffer Overflow in Linux i2c-hid Driver with Low Impact
Publication date: 2026-02-14
Last updated on: 2026-04-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential buffer overflow in the Linux kernel's i2c-hid driver, specifically in the function i2c_hid_get_report().
The issue arises because the function i2c_hid_xfer reads a number of bytes based on recv_len plus the size of a 16-bit value into a buffer called rawbuf. The recv_len value can come from userspace via the hidraw driver and is only limited by a large maximum buffer size (16384 bytes) by default.
However, the actual buffer size for the device (bufsize) can be smaller, which means that reading recv_len + sizeof(__le16) bytes can overflow the buffer if recv_len is not properly limited.
The fix involves truncating recv_len to ensure it does not exceed the buffer size minus the size of the 16-bit value, preventing the overflow.
How can this vulnerability impact me? :
The impact of this vulnerability is considered low because access to hidraw devices, which can trigger this issue, requires root privileges.
If exploited, a buffer overflow could potentially lead to memory corruption, which might be used to execute arbitrary code or cause a denial of service, but only by users with root access.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
This vulnerability affects the Linux kernel's i2c-hid driver and requires root access to exploit via hidraw devices.
Immediate mitigation steps include ensuring your Linux kernel is updated to a version that includes the fix for this issue, which truncates the recv_len to prevent buffer overflow.
Additionally, restrict access to hidraw devices to trusted users only, as exploitation requires root privileges.