CVE-2026-23382
NULL Dereference in Linux Kernel HID Raw Event Callbacks
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 2.6.35 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.17 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.130 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.77 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.203 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.167 (exc) |
| linux | linux_kernel | From 2.6.35.1 (inc) to 5.10.253 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's HID (Human Interface Device) subsystem. It occurs because some raw event callbacks are executed even for HID devices that have not been properly "claimed" by the system. This can lead to a crash if a broken or malformed device is connected, due to missing checks in the code.
The issue was fixed by adding HID_CLAIMED_INPUT guards in raw_event callbacks to ensure that these callbacks only run for devices that have been claimed, preventing potential NULL dereferences and system crashes.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when a broken or malformed HID device is connected to the system. Such crashes can lead to system instability, denial of service, or unexpected reboots, potentially disrupting normal operations.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by adding HID_CLAIMED_INPUT guards in raw_event callbacks in the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix from commit 2ff5baa9b527 or later.