Description
In the Linux kernel, the following vulnerability has been resolved:

HID: alps: fix NULL pointer dereference in alps_raw_event()

Commit ecfa6f34492c ("HID: Add HID_CLAIMED_INPUT guards in raw_event
callbacks missing them") attempted to fix up the HID drivers that had
missed the previous fix that was done in 2ff5baa9b527 ("HID: appleir:
Fix potential NULL dereference at raw event handle"), but the alps
driver was missed.

Fix this up by properly checking in the hid-alps driver that it had been
claimed correctly before attempting to process the raw event.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A NULL pointer dereference occurs in the Linux kernel’s alps HID driver when it processes a raw event that has not been claimed. The flaw, classified as CWE‑476, can lead to a kernel crash or panic, effectively denying service for the system. The vendor added a guard in commit ecfa6f34492c to ensure the device is properly claimed before processing, preventing the dereference. Based on the description, it is inferred that an attacker could trigger the problematic raw event by sending crafted HID traffic to the device, which would yield the crash.

Affected Systems

Any Linux installation that contains the alps HID driver and has not yet incorporated the guard from commit ecfa6f34492c is vulnerable. This includes all kernel releases before that commit, affecting generic Linux distributions that include the alps driver module. The vulnerability affects only the kernel, not user‑space applications.

Risk and Exploitability

The CVSS base score of 5.5 indicates a moderate severity. The EPSS score is less than 1 %, suggesting a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, and the fix removes a local denial‑of‑service vector; exploitation would require local access that can deliver raw HID events to the affected driver. Based on the description, it is inferred that the attack vector is local and requires the ability to send arbitrary HID reports to the device.

Generated by OpenCVE AI on April 28, 2026 at 13:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a revision that includes commit ecfa6f34492c or apply the patch manually to the alps driver.
  • If an update is not immediately possible, disable the alps HID driver (e.g., blacklist it via modprobe.d or remove the module with modprobe -r).
  • Monitor kernel logs such as dmesg and system log files for signs of HID‑related crashes and apply the fix as soon as feasible.

Generated by OpenCVE AI on April 28, 2026 at 13:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Mon, 27 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 27 Apr 2026 14:15:00 +0000


Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: HID: alps: fix NULL pointer dereference in alps_raw_event() Commit ecfa6f34492c ("HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them") attempted to fix up the HID drivers that had missed the previous fix that was done in 2ff5baa9b527 ("HID: appleir: Fix potential NULL dereference at raw event handle"), but the alps driver was missed. Fix this up by properly checking in the hid-alps driver that it had been claimed correctly before attempting to process the raw event.
Title HID: alps: fix NULL pointer dereference in alps_raw_event()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:25.715Z

Reserved: 2026-03-09T15:48:24.124Z

Link: CVE-2026-31625

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:41.807

Modified: 2026-04-27T21:14:33.073

Link: CVE-2026-31625

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31625 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:00:16Z

Weaknesses