In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
History

Wed, 12 Mar 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openshift
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/a:redhat:openshift:4.18::el9
cpe:/o:redhat:enterprise_linux:9
cpe:/o:redhat:rhel_aus:8.2
Vendors & Products Redhat openshift

Tue, 11 Mar 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
Redhat rhel Extras Rt Els
CPEs cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_e4s:9.0::nfv
cpe:/a:redhat:rhel_extras_rt_els:7
cpe:/a:redhat:rhel_tus:8.4::nfv
cpe:/o:redhat:rhel_aus:7.7
cpe:/o:redhat:rhel_aus:8.4
cpe:/o:redhat:rhel_e4s:8.4
cpe:/o:redhat:rhel_els:6
cpe:/o:redhat:rhel_els:7
cpe:/o:redhat:rhel_eus:8.8
cpe:/o:redhat:rhel_tus:8.4
Vendors & Products Redhat rhel Els
Redhat rhel Extras Rt Els

Mon, 10 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:enterprise_linux:8::nfv
cpe:/a:redhat:rhel_eus:9.2
cpe:/a:redhat:rhel_eus:9.2::nfv
cpe:/a:redhat:rhel_eus:9.4
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:rhel_aus:8.6
cpe:/o:redhat:rhel_e4s:8.6
cpe:/o:redhat:rhel_tus:8.6
Vendors & Products Redhat
Redhat enterprise Linux
Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus

Sun, 09 Mar 2025 14:30:00 +0000


Sat, 08 Mar 2025 14:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665
Metrics threat_severity

Important

threat_severity

Moderate


Wed, 05 Mar 2025 14:45:00 +0000

Type Values Removed Values Added
References

Tue, 04 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-03-04'}


Tue, 04 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Sun, 02 Mar 2025 06:30:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Low

threat_severity

Important


Wed, 27 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Weaknesses CWE-908
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 22 Nov 2024 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-665
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H'}

threat_severity

Low


Tue, 19 Nov 2024 01:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
Title HID: core: zero-initialize the report buffer
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-11-19T01:30:51.300Z

Updated: 2025-03-05T04:55:25.599Z

Reserved: 2024-10-21T19:36:19.987Z

Link: CVE-2024-50302

cve-icon Vulnrichment

Updated: 2025-03-04T13:53:13.662Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2024-11-19T02:16:32.320

Modified: 2025-03-05T02:00:02.390

Link: CVE-2024-50302

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-19T00:00:00Z

Links: CVE-2024-50302 - Bugzilla