Description
In the Linux kernel, the following vulnerability has been resolved:

HID: magicmouse: Do not crash on missing msc->input

Fake USB devices can send their own report descriptors for which the
input_mapping() hook does not get called. In this case, msc->input stays NULL,
leading to a crash at a later time.

Detect this condition in the input_configured() hook and reject the device.

This is not supposed to happen with actual magic mouse devices, but can be
provoked by imposing as a magic mouse USB device.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The bug originates in the Linux kernel' HID magicmouse driver when a fake USB device provides a report descriptor that bypasses the expected input_mapping hook. This leaves the internal msc->input pointer uninitialised and NULL. A subsequent use of this NULL pointer causes a kernel crash, resulting in a system reboot or loss of services. The failure manifests as a denial‑of‑service attack that disrupts system availability.

Affected Systems

Any Linux system that runs a kernel containing the vulnerable HID magicmouse driver before the fix is applied is affected. This includes all mainstream distributions that ship unpatched kernel versions matching the commit that introduced the vulnerability. No specific sub‑version was identified, so any kernel build lacking the resolution commit may be susceptible.

Risk and Exploitability

Exploitation requires a USB device that can masquerade as a Magic Mouse, so the attack vector is physical access to a USB port (or remote USB insertion if the attacker can access the physical device). The vulnerability does not grant privilege escalation or information disclosure, but it can trigger a kernel panic, causing a denial of service. Because the EPSS score is missing and the flaw is not listed in CISA KEV, the exact likelihood of exploitation is unclear, yet the potential impact warrants prompt correction.

Generated by OpenCVE AI on May 6, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the fix for the NULL pointer dereference (commit 165912d4321c692321c02793068d30700b4e0f1a or later).
  • If patching is temporarily infeasible, create a udev rule that rejects USB devices identifying as Magic Mouse or otherwise remove the magicmouse driver for unknown devices.
  • Actively monitor USB hot‑plug events for unexpected Magic Mouse identifiers and alert administrators to investigate any unauthorized devices.

Generated by OpenCVE AI on May 6, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: Do not crash on missing msc->input Fake USB devices can send their own report descriptors for which the input_mapping() hook does not get called. In this case, msc->input stays NULL, leading to a crash at a later time. Detect this condition in the input_configured() hook and reject the device. This is not supposed to happen with actual magic mouse devices, but can be provoked by imposing as a magic mouse USB device.
Title HID: magicmouse: Do not crash on missing msc->input
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:25.536Z

Reserved: 2026-05-01T14:12:55.988Z

Link: CVE-2026-43140

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:31.370

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43140

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:30:06Z

Weaknesses