Linux Kernel HID Driver Memory Leak Vulnerability
CVE-2024-50302 Published on November 19, 2024
HID: core: zero-initialize the report buffer
In the Linux kernel, the following vulnerability has been resolved:
HID: core: zero-initialize the report buffer
Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.
Known Exploited Vulnerability
This Linux Kernel Use of Uninitialized Resource Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. The Linux kernel contains a use of uninitialized resource vulnerability that allows an attacker to leak kernel memory via a specially crafted HID report.
The following remediation steps are recommended / required by March 25, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-50302 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
Use of Uninitialized Resource
The software uses or accesses a resource that has not been initialized. When a resource has not been properly initialized, the software may behave unexpectedly. This may lead to a crash or invalid memory access, but the consequences vary depending on the type of resource and how it is used within the software.
Products Associated with CVE-2024-50302
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-50302 are published in these products:
Affected Versions
Linux:- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below e7ea60184e1e88a3c9e437b3265cbb6439aa7e26 is affected.
- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below 3f9e88f2672c4635960570ee9741778d4135ecf5 is affected.
- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below d7dc68d82ab3fcfc3f65322465da3d7031d4ab46 is affected.
- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below 05ade5d4337867929e7ef664e7ac8e0c734f1aaf is affected.
- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below 1884ab3d22536a5c14b17c78c2ce76d1734e8b0b is affected.
- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below 9d9f5c75c0c7f31766ec27d90f7a6ac673193191 is affected.
- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below 492015e6249fbcd42138b49de3c588d826dd9648 is affected.
- Version 27ce405039bfe6d3f4143415c638f56a3df77dca and below 177f25d1292c7e16e1199b39c85480f7f8815552 is affected.
- Version b2b6cadad699d44a8a5b2a60f3d960e00d6fb3b7 is affected.
- Version fe6c9b48ebc920ff21c10c50ab2729440c734254 is affected.
- Version 3.12 is affected.
- Before 3.12 is unaffected.
- Version 4.19.324, <= 4.19.* is unaffected.
- Version 5.4.286, <= 5.4.* is unaffected.
- Version 5.10.230, <= 5.10.* is unaffected.
- Version 5.15.172, <= 5.15.* is unaffected.
- Version 6.1.117, <= 6.1.* is unaffected.
- Version 6.6.61, <= 6.6.* is unaffected.
- Version 6.11.8, <= 6.11.* is unaffected.
- Version 6.12, <= * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.