CVE-2026-31401
Received Received - Intake
Buffer Overflow in Linux Kernel HID-BPF Could Cause Memory Corruption

Publication date: 2026-04-03

Last updated on: 2026-04-27

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: HID: bpf: prevent buffer overflow in hid_hw_request right now the returned value is considered to be always valid. However, when playing with HID-BPF, the return value can be arbitrary big, because it's the return value of dispatch_hid_bpf_raw_requests(), which calls the struct_ops and we have no guarantees that the value makes sense.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's HID subsystem related to BPF (Berkeley Packet Filter). Specifically, it involves a buffer overflow in the function hid_hw_request. The issue arises because the return value from dispatch_hid_bpf_raw_requests(), which calls struct_ops, can be arbitrarily large and is currently assumed to always be valid. This lack of validation can lead to a buffer overflow.


How can this vulnerability impact me? :

The buffer overflow vulnerability in the Linux kernel's HID subsystem could potentially allow an attacker to execute arbitrary code, cause a denial of service, or corrupt memory. This could compromise system stability and security, potentially allowing unauthorized access or control over the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart