CVE-2026-43152
Awaiting Analysis Awaiting Analysis - Queue
HID Probe Error Handling in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: HID: hid-pl: handle probe errors Errors in init must be reported back or we'll follow a NULL pointer the first time FF is used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's HID (Human Interface Device) subsystem, specifically in the hid-pl driver. The issue is that errors occurring during the initialization (probe) phase were not properly reported back. As a result, the system could attempt to follow a NULL pointer the first time Force Feedback (FF) is used, which can lead to unexpected behavior or crashes.


How can this vulnerability impact me? :

If this vulnerability is present, it can cause the Linux kernel to dereference a NULL pointer when Force Feedback is used on affected devices. This can lead to system instability, crashes, or denial of service, potentially disrupting normal operation of the system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart