HID: magicmouse: Do not crash on missing msc->input
Summary
| CVE | CVE-2026-43140 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 12:16:31 UTC |
| Updated | 2026-05-13 20:56:43 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: HID: magicmouse: Do not crash on missing msc->input Fake USB devices can send their own report descriptors for which the input_mapping() hook does not get called. In this case, msc->input stays NULL, leading to a crash at a later time. Detect this condition in the input_configured() hook and reject the device. This is not supposed to happen with actual magic mouse devices, but can be provoked by imposing as a magic mouse USB device. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Problem Types: CWE-476
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 db5ba06e7af9325519a03e52fccf4a9e7c1fd9b2 git | Not specified |
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 165912d4321c692321c02793068d30700b4e0f1a git | Not specified |
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 f6a3860241fbb556fd72332fa31c5e787004413b git | Not specified |
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 243e1165eb03aca97d87aafa9c3130593837a1c2 git | Not specified |
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 922bd3e498a4b8e445def6e6ffea2ad3682ad516 git | Not specified |
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 5bbe266272d86c0657e8253600f3d5b74fb7b2ae git | Not specified |
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 36c83c1329dd881f290f7df2feadfb9a21775108 git | Not specified |
| CNA | Linux | Linux | affected 64eb105d7f92fa48798106ac0d8bf17668eb2524 17abd396548035fbd6179ee1a431bd75d49676a7 git | Not specified |
| CNA | Linux | Linux | affected 2.6.37 | Not specified |
| CNA | Linux | Linux | unaffected 2.6.37 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.252 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.202 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.165 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.128 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.75 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.16 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.6 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/243e1165eb03aca97d87aafa9c3130593837a1c2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/5bbe266272d86c0657e8253600f3d5b74fb7b2ae | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/165912d4321c692321c02793068d30700b4e0f1a | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/17abd396548035fbd6179ee1a431bd75d49676a7 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/db5ba06e7af9325519a03e52fccf4a9e7c1fd9b2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/f6a3860241fbb556fd72332fa31c5e787004413b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/922bd3e498a4b8e445def6e6ffea2ad3682ad516 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/36c83c1329dd881f290f7df2feadfb9a21775108 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.