Bug 2464494 (CVE-2026-43048) - CVE-2026-43048 kernel: HID: core: Mitigate potential OOB by removing bogus memset()
Summary: CVE-2026-43048 kernel: HID: core: Mitigate potential OOB by removing bogus me...
Keywords:
Status: NEW
Alias: CVE-2026-43048
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-01 15:09 UTC by OSIDB Bzimport
Modified: 2026-05-01 18:33 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-01 15:09:55 UTC
In the Linux kernel, the following vulnerability has been resolved:

HID: core: Mitigate potential OOB by removing bogus memset()

The memset() in hid_report_raw_event() has the good intention of
clearing out bogus data by zeroing the area from the end of the incoming
data string to the assumed end of the buffer.  However, as we have
previously seen, doing so can easily result in OOB reads and writes in
the subsequent thread of execution.

The current suggestion from one of the HID maintainers is to remove the
memset() and simply return if the incoming event buffer size is not
large enough to fill the associated report.

Suggested-by Benjamin Tissoires <bentiss>

[bentiss: changed the return value]


Note You need to log in before you can comment on or make changes to this bug.