U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-43051 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq The wacom_intuos_bt_irq() function processes Bluetooth HID reports without sufficient bounds checking. A maliciously crafted short report can trigger an out-of-bounds read when copying data into the wacom structure. Specifically, report 0x03 requires at least 22 bytes to safely read the processed data and battery status, while report 0x04 (which falls through to 0x03) requires 32 bytes. Add explicit length checks for these report IDs and log a warning if a short report is received.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/2f1763f62909ccb6386ac50350fa0abbf5bb16a9 kernel.org
https://git.kernel.org/stable/c/3d78386b144453c47e81bf62dc3601b757f02d99 kernel.org
https://git.kernel.org/stable/c/41026bcc0fdf82605205c27935ef719cbc07193b kernel.org
https://git.kernel.org/stable/c/5b5b9730111808410e404ceac2fabd32eef92fbd kernel.org
https://git.kernel.org/stable/c/8bd690ac1242332c73cba10dacdad6c6642bbb94 kernel.org
https://git.kernel.org/stable/c/c8dc23c97680eebefde06da5858aaef1b37cf75d kernel.org
https://git.kernel.org/stable/c/d0ae84b3c9f3ea1a564eb1b7612113ca9fe8aada kernel.org
https://git.kernel.org/stable/c/fa8901cb1f0b2113a342db93bd5684b59fe99dcf kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-43051
NVD Published Date:
05/01/2026
NVD Last Modified:
05/03/2026
Source:
kernel.org