Description
In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-hidpp: Check maxfield in hidpp_get_report_length()

Do not crash when a report has no fields.

Fake USB gadgets can send their own HID report descriptors and can define report
structures without valid fields. This can be used to crash the kernel over USB.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability occurs when a HID report defined by a Logitech HID++ device contains no valid fields. In the kernel's hidpp_get_report_length() function the maximum number of fields (maxfield) is not verified against the actual descriptor data. Processing such a report causes the kernel to dereference uninitialized data, leading to a crash. An attacker who can supply a crafted HID report—a malicious USB gadget or an untrusted HID device—can exploit this flaw to trigger a kernel panic, resulting in a denial‑of‑service condition for the affected system.

Affected Systems

The flaw resides in the Linux kernel's logitech‑hidpp driver. Any Linux installation that uses a kernel version with this unpatched driver is vulnerable. Because the vendor/product list includes only "Linux:Linux", the impact spans all distributions that ship the affected kernel release, regardless of vendor.

Risk and Exploitability

The vulnerability has no publicly available exploit scripts, and the EPSS score is unavailable, but the nature of the flaw—an arbitrary crash caused by an untrusted USB device—indicates a high potential for abuse. The kernel crash is a local denial‑of‑service that disrupts system availability. The attack path requires physical or remote access to the USB bus; a malicious gadget can be connected to a target system’s USB port and send a HID report with an empty descriptor. Because the flaw factors are independent of user privileges, any local user with the ability to connect a USB device could trigger it.

Generated by OpenCVE AI on May 6, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest Linux kernel version that contains the logitech‑hidpp fix.
  • If a kernel update is not immediately possible, disable or unload the logitech‑hidpp driver to prevent processing of Logitech HID++ devices.
  • Limit USB device access by accepting only trusted devices, or temporarily disconnect untrusted USB peripherals until the kernel is patched.

Generated by OpenCVE AI on May 6, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() Do not crash when a report has no fields. Fake USB gadgets can send their own HID report descriptors and can define report structures without valid fields. This can be used to crash the kernel over USB.
Title HID: logitech-hidpp: Check maxfield in hidpp_get_report_length()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:22.892Z

Reserved: 2026-05-01T14:12:55.988Z

Link: CVE-2026-43136

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:30.880

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T14:00:06Z

Weaknesses