CVE-2026-23382
Received Received - Intake
NULL Dereference in Linux Kernel HID Raw Event Callbacks

Publication date: 2026-03-25

Last updated on: 2026-04-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them In commit 2ff5baa9b527 ("HID: appleir: Fix potential NULL dereference at raw event handle"), we handle the fact that raw event callbacks can happen even for a HID device that has not been "claimed" causing a crash if a broken device were attempted to be connected to the system. Fix up the remaining in-tree HID drivers that forgot to add this same check to resolve the same issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 15 associated CPEs
Vendor Product Version / Range
linux linux_kernel 2.6.35
linux linux_kernel From 6.19 (inc) to 6.19.7 (exc)
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel 7.0
linux linux_kernel From 6.13 (inc) to 6.18.17 (exc)
linux linux_kernel From 6.2 (inc) to 6.6.130 (exc)
linux linux_kernel From 6.7 (inc) to 6.12.77 (exc)
linux linux_kernel From 5.11 (inc) to 5.15.203 (exc)
linux linux_kernel From 5.16 (inc) to 6.1.167 (exc)
linux linux_kernel From 2.6.35.1 (inc) to 5.10.253 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's HID (Human Interface Device) subsystem. It occurs because some raw event callbacks are executed even for HID devices that have not been properly "claimed" by the system. This can lead to a crash if a broken or malformed device is connected, due to missing checks in the code.

The issue was fixed by adding HID_CLAIMED_INPUT guards in raw_event callbacks to ensure that these callbacks only run for devices that have been claimed, preventing potential NULL dereferences and system crashes.


How can this vulnerability impact me? :

This vulnerability can cause the Linux kernel to crash when a broken or malformed HID device is connected to the system. Such crashes can lead to system instability, denial of service, or unexpected reboots, potentially disrupting normal operations.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been resolved by adding HID_CLAIMED_INPUT guards in raw_event callbacks in the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix from commit 2ff5baa9b527 or later.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart