CVE-2026-23382 (GCVE-0-2026-23382)

Vulnerability from cvelistv5 – Published: 2026-03-25 10:28 – Updated: 2026-04-18 08:58
VLAI?
Title
HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them
Summary
In the Linux kernel, the following vulnerability has been resolved: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them In commit 2ff5baa9b527 ("HID: appleir: Fix potential NULL dereference at raw event handle"), we handle the fact that raw event callbacks can happen even for a HID device that has not been "claimed" causing a crash if a broken device were attempted to be connected to the system. Fix up the remaining in-tree HID drivers that forgot to add this same check to resolve the same issue.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < b48284d7f0f76023b215a3409cdc989b5081eadf (git)
Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < de316c1edf15bc30ff5e0d4c7b37c70fd41cf319 (git)
Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < ac83b0d91a3f4f0c012ba9c85fb99436cddb1208 (git)
Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < 6e330889e6c8db99f04d4feb861d23de4e8fbb13 (git)
Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < 892dbaf46bb738dacf1fa663eadb3712c85868f0 (git)
Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < 20864e3e41c74cda253a9fa6b6fe093c1461a6a9 (git)
Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < 575122cd6569c4c4aa13c4c9958fea506724c788 (git)
Affected: d0742abaa1c396a26bb3d3ce2732988cd3faa020 , < ecfa6f34492c493a9a1dc2900f3edeb01c79946b (git)
Create a notification for this product.
    Linux Linux Affected: 2.6.35
Unaffected: 0 , < 2.6.35 (semver)
Unaffected: 5.10.253 , ≤ 5.10.* (semver)
Unaffected: 5.15.203 , ≤ 5.15.* (semver)
Unaffected: 6.1.167 , ≤ 6.1.* (semver)
Unaffected: 6.6.130 , ≤ 6.6.* (semver)
Unaffected: 6.12.77 , ≤ 6.12.* (semver)
Unaffected: 6.18.17 , ≤ 6.18.* (semver)
Unaffected: 6.19.7 , ≤ 6.19.* (semver)
Unaffected: 7.0 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/hid-cmedia.c",
            "drivers/hid/hid-creative-sb0540.c",
            "drivers/hid/hid-zydacron.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "b48284d7f0f76023b215a3409cdc989b5081eadf",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            },
            {
              "lessThan": "de316c1edf15bc30ff5e0d4c7b37c70fd41cf319",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            },
            {
              "lessThan": "ac83b0d91a3f4f0c012ba9c85fb99436cddb1208",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            },
            {
              "lessThan": "6e330889e6c8db99f04d4feb861d23de4e8fbb13",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            },
            {
              "lessThan": "892dbaf46bb738dacf1fa663eadb3712c85868f0",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            },
            {
              "lessThan": "20864e3e41c74cda253a9fa6b6fe093c1461a6a9",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            },
            {
              "lessThan": "575122cd6569c4c4aa13c4c9958fea506724c788",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            },
            {
              "lessThan": "ecfa6f34492c493a9a1dc2900f3edeb01c79946b",
              "status": "affected",
              "version": "d0742abaa1c396a26bb3d3ce2732988cd3faa020",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/hid/hid-cmedia.c",
            "drivers/hid/hid-creative-sb0540.c",
            "drivers/hid/hid-zydacron.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.35"
            },
            {
              "lessThan": "2.6.35",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.253",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.203",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.167",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.130",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.77",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.17",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.19.*",
              "status": "unaffected",
              "version": "6.19.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "7.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.253",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.203",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.167",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.130",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.77",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.17",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19.7",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "7.0",
                  "versionStartIncluding": "2.6.35",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them\n\nIn commit 2ff5baa9b527 (\"HID: appleir: Fix potential NULL dereference at\nraw event handle\"), we handle the fact that raw event callbacks\ncan happen even for a HID device that has not been \"claimed\" causing a\ncrash if a broken device were attempted to be connected to the system.\n\nFix up the remaining in-tree HID drivers that forgot to add this same\ncheck to resolve the same issue."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-18T08:58:24.172Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/b48284d7f0f76023b215a3409cdc989b5081eadf"
        },
        {
          "url": "https://git.kernel.org/stable/c/de316c1edf15bc30ff5e0d4c7b37c70fd41cf319"
        },
        {
          "url": "https://git.kernel.org/stable/c/ac83b0d91a3f4f0c012ba9c85fb99436cddb1208"
        },
        {
          "url": "https://git.kernel.org/stable/c/6e330889e6c8db99f04d4feb861d23de4e8fbb13"
        },
        {
          "url": "https://git.kernel.org/stable/c/892dbaf46bb738dacf1fa663eadb3712c85868f0"
        },
        {
          "url": "https://git.kernel.org/stable/c/20864e3e41c74cda253a9fa6b6fe093c1461a6a9"
        },
        {
          "url": "https://git.kernel.org/stable/c/575122cd6569c4c4aa13c4c9958fea506724c788"
        },
        {
          "url": "https://git.kernel.org/stable/c/ecfa6f34492c493a9a1dc2900f3edeb01c79946b"
        }
      ],
      "title": "HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-23382",
    "datePublished": "2026-03-25T10:28:01.040Z",
    "dateReserved": "2026-01-13T15:37:46.007Z",
    "dateUpdated": "2026-04-18T08:58:24.172Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2026-23382",
      "date": "2026-04-24",
      "epss": "0.00032",
      "percentile": "0.09294"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-23382\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-03-25T11:16:38.330\",\"lastModified\":\"2026-04-18T09:16:22.800\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nHID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them\\n\\nIn commit 2ff5baa9b527 (\\\"HID: appleir: Fix potential NULL dereference at\\nraw event handle\\\"), we handle the fact that raw event callbacks\\ncan happen even for a HID device that has not been \\\"claimed\\\" causing a\\ncrash if a broken device were attempted to be connected to the system.\\n\\nFix up the remaining in-tree HID drivers that forgot to add this same\\ncheck to resolve the same issue.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nHID: A\u00f1adir protecciones HID_CLAIMED_INPUT en las retrollamadas de raw_event que las omiten\\n\\nEn el commit 2ff5baa9b527 (\u0027HID: appleir: Corregir posible desreferencia NULL en el manejo de eventos raw\u0027), abordamos el hecho de que las retrollamadas de eventos raw pueden ocurrir incluso para un dispositivo HID que no ha sido \u0027reclamado\u0027, causando un fallo si se intentara conectar un dispositivo defectuoso al sistema.\\n\\nCorregir los controladores HID restantes en el \u00e1rbol que olvidaron a\u00f1adir esta misma comprobaci\u00f3n para resolver el mismo problema.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/20864e3e41c74cda253a9fa6b6fe093c1461a6a9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/575122cd6569c4c4aa13c4c9958fea506724c788\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6e330889e6c8db99f04d4feb861d23de4e8fbb13\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/892dbaf46bb738dacf1fa663eadb3712c85868f0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ac83b0d91a3f4f0c012ba9c85fb99436cddb1208\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b48284d7f0f76023b215a3409cdc989b5081eadf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/de316c1edf15bc30ff5e0d4c7b37c70fd41cf319\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ecfa6f34492c493a9a1dc2900f3edeb01c79946b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…