CVE-2026-43048
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
01/05/2026
Last modified:
07/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
HID: core: Mitigate potential OOB by removing bogus memset()<br />
<br />
The memset() in hid_report_raw_event() has the good intention of<br />
clearing out bogus data by zeroing the area from the end of the incoming<br />
data string to the assumed end of the buffer. However, as we have<br />
previously seen, doing so can easily result in OOB reads and writes in<br />
the subsequent thread of execution.<br />
<br />
The current suggestion from one of the HID maintainers is to remove the<br />
memset() and simply return if the incoming event buffer size is not<br />
large enough to fill the associated report.<br />
<br />
Suggested-by Benjamin Tissoires <br />
<br />
[bentiss: changed the return value]
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.15.1 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.15:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



