HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq
Summary
| CVE | CVE-2026-43051 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-01 15:16:51 UTC |
| Updated | 2026-05-03 07:16:24 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq The wacom_intuos_bt_irq() function processes Bluetooth HID reports without sufficient bounds checking. A maliciously crafted short report can trigger an out-of-bounds read when copying data into the wacom structure. Specifically, report 0x03 requires at least 22 bytes to safely read the processed data and battery status, while report 0x04 (which falls through to 0x03) requires 32 bytes. Add explicit length checks for these report IDs and log a warning if a short report is received. |
Risk And Classification
Primary CVSS: v3.1 8.1 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
EPSS: 0.000240000 probability, percentile 0.068220000 (date 2026-05-02)
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 8.1 | HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
| 3.1 | CNA | DECLARED | 8.1 | HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
AdjacentAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
HighCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a d0ae84b3c9f3ea1a564eb1b7612113ca9fe8aada git | Not specified |
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a 5b5b9730111808410e404ceac2fabd32eef92fbd git | Not specified |
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a fa8901cb1f0b2113a342db93bd5684b59fe99dcf git | Not specified |
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a 8bd690ac1242332c73cba10dacdad6c6642bbb94 git | Not specified |
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a 41026bcc0fdf82605205c27935ef719cbc07193b git | Not specified |
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a c8dc23c97680eebefde06da5858aaef1b37cf75d git | Not specified |
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a 3d78386b144453c47e81bf62dc3601b757f02d99 git | Not specified |
| CNA | Linux | Linux | affected 78761ff9bc4e944e0b4e5df1e7eedcfdbb1a9a1a 2f1763f62909ccb6386ac50350fa0abbf5bb16a9 git | Not specified |
| CNA | Linux | Linux | affected 3.3 | Not specified |
| CNA | Linux | Linux | unaffected 3.3 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.134 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.81 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.22 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.12 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/41026bcc0fdf82605205c27935ef719cbc07193b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/fa8901cb1f0b2113a342db93bd5684b59fe99dcf | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/8bd690ac1242332c73cba10dacdad6c6642bbb94 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/3d78386b144453c47e81bf62dc3601b757f02d99 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/2f1763f62909ccb6386ac50350fa0abbf5bb16a9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/c8dc23c97680eebefde06da5858aaef1b37cf75d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/5b5b9730111808410e404ceac2fabd32eef92fbd | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/d0ae84b3c9f3ea1a564eb1b7612113ca9fe8aada | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.