Description
In the Linux kernel, the following vulnerability has been resolved:

HID: hid-pl: handle probe errors

Errors in init must be reported back or we'll
follow a NULL pointer the first time FF is used.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel HID plug‑and‑play module fails to report probe errors correctly, resulting in a NULL pointer dereference when force‑feedback (FF) functionality is first used. This bug can cause the system to crash or panic, interrupting all services and potentially requiring a reboot. The vulnerability affects confidentiality and integrity only indirectly, as the crash does not provide direct data disclosure or code execution.

Affected Systems

Vulnerable systems are Linux kernels that include the HID‑PL subsystem before the fix. The exact affected releases are not listed, but any kernel version not containing the commit that resolves the probe error is at risk. Administrators should review the release notes of upcoming kernel versions for the addressed change.

Risk and Exploitability

Based on the description, it is inferred that the likely attack vector is a user or attacker who can use force‑feedback capabilities on a connected HID device, such as a game controller or joystick. In such an environment, triggering the force‑feedback action would cause the kernel to follow a NULL pointer during the first use, leading to a crash. The lack of a KEV or EPSS entry indicates that public exploitation has not been observed, but a local or device‑based denial of service remains possible. The potential for a kernel panic suggests high impact if the flaw is triggered. The exploitability depends on the attacker’s ability to interact with a HID device that exercises force‑feedback.

Generated by OpenCVE AI on May 6, 2026 at 17:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a release that includes the HID plug‑and‑play probe error fix (commit 04e50f45b5175bb90a06f5003113cb4ed6ba44c2 or later).
  • Reboot the system to load the updated kernel and ensure the new module is active.
  • Verify that no probe errors occur when force‑feedback is accessed on connected HID devices and monitor system logs for related panic messages.

Generated by OpenCVE AI on May 6, 2026 at 17:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: HID: hid-pl: handle probe errors Errors in init must be reported back or we'll follow a NULL pointer the first time FF is used.
Title HID: hid-pl: handle probe errors
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:33.736Z

Reserved: 2026-05-01T14:12:55.989Z

Link: CVE-2026-43152

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:32.943

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43152

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T17:15:08Z

Weaknesses