VYPR
High severity7.8NVD Advisory· Published Apr 3, 2026· Updated May 20, 2026

CVE-2026-31401

CVE-2026-31401

Description

In the Linux kernel, the following vulnerability has been resolved:

HID: bpf: prevent buffer overflow in hid_hw_request

right now the returned value is considered to be always valid. However, when playing with HID-BPF, the return value can be arbitrary big, because it's the return value of dispatch_hid_bpf_raw_requests(), which calls the struct_ops and we have no guarantees that the value makes sense.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a missing bounds check in HID-BPF's hid_hw_request can cause a buffer overflow via an attacker-controlled return value.

Vulnerability

The Linux kernel's HID subsystem, when using BPF (HID-BPF), contains a buffer overflow vulnerability in the hid_hw_request function. The issue arises because the return value from dispatch_hid_bpf_raw_requests() is assumed to always be valid, but when HID-BPF struct_ops are invoked, the returned value can be arbitrarily large, as it is user-controlled via BPF programs [1][2][4].

Exploitation

An attacker with the ability to load a HID-BPF program (typically requiring local access or a privileged position) can craft a BPF program that returns an enormous value from dispatch_hid_bpf_raw_requests(). This unchecked return value is then used in hid_hw_request without proper bounds validation, leading to a buffer overflow when copying data into a fixed-size buffer [3]. No special hardware is required beyond a kernel configured with CONFIG_HID_BPF.

Impact

Successful exploitation results in a kernel buffer overflow, which can corrupt adjacent memory, potentially leading to a system crash (denial of service) or, under controlled conditions, privilege escalation. The CVSS score of 7.8 reflects the high impact on confidentiality, integrity, and availability, due to the possibility of arbitrary code execution in kernel context.

Mitigation

The fix was applied in multiple stable kernel commits, including those referenced in the advisory [1][2][3][4]. Users should apply the latest kernel updates from their distribution to ensure the validation of the HID-BPF return value is enforced.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.