Impact
A null pointer dereference occurs in the Intel-thc HID driver when the code reads a DMA buffer that may not be ready. The vulnerability allows a kernel crash, which can lead to a system reboot or denial of service. The weakness is a classic null pointer dereference (CWE‑476). The likely attack vector is a specially crafted HID device that can trigger the driver to read an uninitialized buffer, but the description itself does not specify the exploitation method, so this inference is based on typical HID driver behavior.
Affected Systems
The affected product is the Linux kernel. Specifically, release candidate versions 6.19.rc1 through 6.19.rc4 on all Linux platforms are impacted, as identified by the CVE advisory. No other vendors or products are listed.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score of less than 1% shows a very low probability of exploitation. The vulnerability is not currently listed in the CISA KEV catalog, suggesting no widespread, actively exploited incidents are known. Practical exploitation would likely require proximity or physical access to the vulnerable device, making it most relevant to environments that allow untrusted HID devices. Updating to a patched kernel mitigates the risk effectively.
OpenCVE Enrichment