{"id":"CVE-2026-23178","summary":"HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()\n\n`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data\ninto `ihid-\u003erawbuf`.\n\nThe former can come from the userspace in the hidraw driver and is only\nbounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set\n`max_buffer_size` field of `struct hid_ll_driver` which we do not).\n\nThe latter has size determined at runtime by the maximum size of\ndifferent report types you could receive on any particular device and\ncan be a much smaller value.\n\nFix this by truncating `recv_len` to `ihid-\u003ebufsize - sizeof(__le16)`.\n\nThe impact is low since access to hidraw devices requires root.","modified":"2026-05-18T05:58:33.110354081Z","published":"2026-02-14T16:27:10.108Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21284-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23178.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2124279f1f8c32c1646ce98e75a1a39b23b7db76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2497ff38c530b1af0df5130ca9f5ab22c5e92f29"},{"type":"WEB","url":"https://git.kernel.org/stable/c/786ec171788bdf9dda38789163f1b1fbb47f2d1e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cff3f619fd1cb40cdd89971df9001f075613d219"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f9c9ad89d845f88a1509e9d672f65d234425fde9"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23178.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23178"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"85df713377ddc0482071c3e6b64c37bd1e48f1f1"},{"fixed":"f9c9ad89d845f88a1509e9d672f65d234425fde9"},{"fixed":"cff3f619fd1cb40cdd89971df9001f075613d219"},{"fixed":"786ec171788bdf9dda38789163f1b1fbb47f2d1e"},{"fixed":"2124279f1f8c32c1646ce98e75a1a39b23b7db76"},{"fixed":"2497ff38c530b1af0df5130ca9f5ab22c5e92f29"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23178.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.18.0"},{"fixed":"6.1.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.124"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.70"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23178.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}