Impact
The vulnerability is in the Linux HID-BPF subsystem where the return value from dispatch_hid_bpf_raw_requests is treated as a buffer size in hid_hw_request without validation. Because the value can be arbitrarily large, the kernel may attempt to copy more data than a buffer can hold, causing a buffer overflow and potential memory corruption.
Affected Systems
The flaw affects the Linux kernel itself. Any kernel release that contains the vulnerable HID-BPF code path and has not yet applied the patch is considered exposed. The CVE data does not provide a precise version range, so any kernel version from the beginning of the HID-BPF implementation up to the fix should be regarded as at risk.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. The EPSS score of less than 1 % points to a low probability of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog, showing no publicly known active exploits. The CVE record does not describe an attack vector or exploitation mechanism; the flaw appears to require that an attacker supplies a custom HID‑BPF program that is processed by the kernel, but this premise is not confirmed by the data.
OpenCVE Enrichment