Description
In the Linux kernel, the following vulnerability has been resolved:

HID: pidff: Fix condition effect bit clearing

As reported by MPDarkGuy on discord, NULL pointer dereferences were
happening because not all the conditional effects bits were cleared.

Properly clear all conditional effect bits from ffbit
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

An issue in the Linux kernel's HID pidff subsystem allows a NULL pointer dereference when conditional effect bits are not properly cleared. The flaw can cause the kernel to crash, resulting in a denial of service. The bug maps to CWE‑824, indicating a loss of error handling and control flow disruption.

Affected Systems

The vulnerability affects Linux kernel installations that include the pidff driver before the fix. All current Linux distributions using kernels that have not yet applied the patch are potentially impacted. The exact kernel versions are not listed, so administrators should check the vendor’s release notes for the patch that incorporates the bit‑clearing change.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests the likelihood of exploitation is low. Because the exploit requires interacting with the HID subsystem, the attack vector is likely local or requires privileged access to a malicious HID device. No entry in the CISA KEV catalog means no confirmed widespread attacks are reported. If an attacker can supply a crafted HID signal that triggers the un‑cleared conditional bits, the kernel will dereference a null pointer, leading to a crash.

Generated by OpenCVE AI on March 26, 2026 at 14:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update your Linux kernel to the latest release that contains the pidff NULL pointer dereference fix.
  • If an update cannot be applied immediately, limit exposure by restricting access to HID devices to trusted users or scripts, and adjust device permissions to prevent untrusted devices from communicating with the kernel.
  • Monitor kernel logs (e.g., dmesg or system journal) for messages indicating kernel panics related to HID devices, and investigate any such incidents promptly.

Generated by OpenCVE AI on March 26, 2026 at 14:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
CPEs cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: HID: pidff: Fix condition effect bit clearing As reported by MPDarkGuy on discord, NULL pointer dereferences were happening because not all the conditional effects bits were cleared. Properly clear all conditional effect bits from ffbit
Title HID: pidff: Fix condition effect bit clearing
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:05:33.259Z

Reserved: 2026-01-13T15:37:45.999Z

Link: CVE-2026-23349

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:33.197

Modified: 2026-04-24T18:06:21.640

Link: CVE-2026-23349

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23349 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:49:27Z

Weaknesses