In the Linux kernel, the following vulnerability has been resolved:
HID: bpf: prevent buffer overflow in hid_hw_request
right now the returned value is considered to be always valid. However,
when playing with HID-BPF, the return value can be arbitrary big,
because it's the return value of dispatch_hid_bpf_raw_requests(), which
calls the struct_ops and we have no guarantees that the value makes
sense.
CVE-2026-31401
NONE
EPSS 0.02%
Updated Apr 07, 2026
Linux
https://git.kernel.org/stable/c/2b658c1c442ec1cd9eec5ead98d68662c40fe645
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/73c5b5aea1c443239c8cb4191b4af7a4bd6fd7b1
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/d6efaa50af62fb0790dd1fd4e7e5506b46312510
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/eb57dae20fdf6f3069cdc07821fa3bb46de381d7
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVE Details
CVE ID
CVE-2026-31401
Published Date
Apr 03, 2026
Vendor
Linux
Severity
NONE
Exploit Prediction (EPSS)
Probability of Exploit
0.02%
Likelihood of exploitation in next 30 days
Percentile:
6.4th percentile (higher than 6.4% of all CVEs)
Standard patching cycle
Impact
Minimal impact
Source
View Advisory