Impact
The Linux kernel’s i2c‑hid driver contains a buffer overflow when processing report requests. A user‑space request can cause the kernel to read more data than fits in the destination buffer, leading to an out‑of‑bounds write in kernel memory. This may corrupt kernel data and could trigger a crash, but exploitation would require access to /dev/hidraw, which is restricted to root, so the practical impact is limited.
Affected Systems
All Linux kernel versions that include the unpatched i2c‑hid driver are affected. The vendor is Linux, the product is the Linux kernel. No specific version numbers are listed, so every kernel build before the patch that contains the i2c‑hid subsystem is potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates medium‑to‑high severity, yet the EPSS score is less than 1 % and the vulnerability is not in CISA’s KEV catalog, suggesting a low likelihood of exploitation. Because access to /dev/hidraw devices requires root, the attack vector is local and requires privileged execution. The consequence is therefore limited to systems where an attacker already has root or can compromise a privileged process; under typical defense‑in‑depth controls the risk remains low.
OpenCVE Enrichment
Debian DLA
Debian DSA