In the Linux kernel, the following vulnerability has been resolved:

HID: core: zero-initialize the report buffer

Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4008-1 linux-6.1 security update
Debian DLA Debian DLA DLA-4075-1 linux security update
Debian DSA Debian DSA DSA-5818-1 linux security update
EUVD EUVD EUVD-2024-44804 In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
Ubuntu USN Ubuntu USN USN-7276-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7277-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7288-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7288-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7289-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7289-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7289-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7289-4 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7291-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7293-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7294-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7294-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7294-3 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7294-4 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7295-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7305-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7308-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7310-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7331-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7388-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7389-1 Linux kernel (NVIDIA Tegra) vulnerabilities
Ubuntu USN Ubuntu USN USN-7390-1 Linux kernel (Xilinx ZynqMP) vulnerabilities
Ubuntu USN Ubuntu USN USN-7393-1 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7401-1 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7402-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7402-2 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-7402-3 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-7402-4 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7402-5 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-7403-1 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-7413-1 Linux kernel (IoT) vulnerabilities
Ubuntu USN Ubuntu USN USN-7428-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7428-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7429-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7429-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7451-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7458-1 Linux kernel (IBM) vulnerabilities
Ubuntu USN Ubuntu USN USN-7468-1 Linux kernel (Azure, N-Series) vulnerabilities
Ubuntu USN Ubuntu USN USN-7523-1 Linux kernel (Raspberry Pi Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-7524-1 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-7539-1 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-7540-1 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-7720-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 30 Jul 2025 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00247}

epss

{'score': 0.00219}


Fri, 04 Apr 2025 02:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.16::el9

Thu, 20 Mar 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.13::el9
cpe:/a:redhat:openshift:4.14::el9

Fri, 14 Mar 2025 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.12::el8

Thu, 13 Mar 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.15::el9

Thu, 13 Mar 2025 02:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.17::el9

Wed, 12 Mar 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/a:redhat:openshift:4.18::el9
cpe:/o:redhat:enterprise_linux:9
cpe:/o:redhat:rhel_aus:8.2
Vendors & Products Redhat openshift

Tue, 11 Mar 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
Redhat rhel Extras Rt Els
CPEs cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_e4s:9.0::nfv
cpe:/a:redhat:rhel_extras_rt_els:7
cpe:/a:redhat:rhel_tus:8.4::nfv
cpe:/o:redhat:rhel_aus:7.7
cpe:/o:redhat:rhel_aus:8.4
cpe:/o:redhat:rhel_e4s:8.4
cpe:/o:redhat:rhel_els:6
cpe:/o:redhat:rhel_els:7
cpe:/o:redhat:rhel_eus:8.8
cpe:/o:redhat:rhel_tus:8.4
Vendors & Products Redhat rhel Els
Redhat rhel Extras Rt Els

Mon, 10 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:enterprise_linux:8::nfv
cpe:/a:redhat:rhel_eus:9.2
cpe:/a:redhat:rhel_eus:9.2::nfv
cpe:/a:redhat:rhel_eus:9.4
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:rhel_aus:8.6
cpe:/o:redhat:rhel_e4s:8.6
cpe:/o:redhat:rhel_tus:8.6
Vendors & Products Redhat
Redhat enterprise Linux
Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus

Sun, 09 Mar 2025 14:30:00 +0000


Sat, 08 Mar 2025 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665
Metrics threat_severity

Important

threat_severity

Moderate


Wed, 05 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
References

Tue, 04 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-03-04'}


Tue, 04 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Sun, 02 Mar 2025 06:30:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Low

threat_severity

Important


Wed, 27 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Weaknesses CWE-908
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 22 Nov 2024 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H'}

threat_severity

Low


Tue, 19 Nov 2024 01:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
Title HID: core: zero-initialize the report buffer
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-07-30T01:36:25.365Z

Reserved: 2024-10-21T19:36:19.987Z

Link: CVE-2024-50302

cve-icon Vulnrichment

Updated: 2025-03-04T13:53:13.662Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2024-11-19T02:16:32.320

Modified: 2025-03-05T02:00:02.390

Link: CVE-2024-50302

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-19T00:00:00Z

Links: CVE-2024-50302 - Bugzilla

cve-icon OpenCVE Enrichment

No data.