HID: core: zero-initialize the report buffer

Summary

CVECVE-2024-50302
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2024-11-19 02:16:32 UTC
Updated2026-05-12 18:47:16 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.

Risk And Classification

Primary CVSS: v3.1 5.5 MEDIUM from [email protected]

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS: 0.016980000 probability, percentile 0.824110000 (date 2026-05-11)

CISA KEV: Listed on 2025-03-04; due 2025-03-25; ransomware use Unknown

Problem Types: CWE-908 | CWE-908 CWE-908 Use of Uninitialized Resource


VersionSourceTypeScoreSeverityVector
3.1[email protected]Primary5.5MEDIUMCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
3.1ADPDECLARED5.5MEDIUMCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
3.1134c704f-9b21-4f2e-91b3-4a467353bcc0Secondary5.5MEDIUMCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA Known Exploited Vulnerability

VendorLinux
ProductKernel
NameLinux Kernel Use of Uninitialized Resource Vulnerability
Required ActionApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
NotesThis vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024111908-CVE-2024-50302-f677@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-03-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-50302

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 11.0 All All All
Operating System Google Android - All All All
Operating System Linux Linux Kernel All All All All
Hardware Siemens Ruggedcom Rst2428p - All All All
Hardware Siemens Scalance Xc316-8 - All All All
Hardware Siemens Scalance Xc319-4 - All All All
Hardware Siemens Scalance Xc324-4 - All All All
Hardware Siemens Scalance Xc324-4eec - All All All
Hardware Siemens Scalance Xc332 - All All All
Hardware Siemens Scalance Xc416-8 - All All All
Hardware Siemens Scalance Xc419-4 - All All All
Hardware Siemens Scalance Xc424-4 - All All All
Hardware Siemens Scalance Xc432 - All All All
Hardware Siemens Scalance Xch328 - All All All
Hardware Siemens Scalance Xcm324 - All All All
Hardware Siemens Scalance Xcm328 - All All All
Hardware Siemens Scalance Xcm332 - All All All
Hardware Siemens Scalance Xr302-32 - All All All
Hardware Siemens Scalance Xr322-12 - All All All
Hardware Siemens Scalance Xr326-8 - All All All
Hardware Siemens Scalance Xr326-8eec - All All All
Hardware Siemens Scalance Xr502-32 - All All All
Hardware Siemens Scalance Xr522-12 - All All All
Hardware Siemens Scalance Xr524-8c - All All All
Hardware Siemens Scalance Xr524-8wg - All All All
Hardware Siemens Scalance Xr526-8 - All All All
Hardware Siemens Scalance Xr526-8c - All All All
Hardware Siemens Scalance Xr528-6m - All All All
Hardware Siemens Scalance Xr552-12m - All All All
Hardware Siemens Scalance Xrh334 - All All All
Hardware Siemens Scalance Xrm334 - All All All
Hardware Siemens Simatic S7-1500 Tm Mfp - All All All
Operating System Siemens Simatic S7-1500 Tm Mfp Firmware - All All All
Operating System Siemens Sinec Os All All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca e7ea60184e1e88a3c9e437b3265cbb6439aa7e26 git Not specified
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca 3f9e88f2672c4635960570ee9741778d4135ecf5 git Not specified
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca d7dc68d82ab3fcfc3f65322465da3d7031d4ab46 git Not specified
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca 05ade5d4337867929e7ef664e7ac8e0c734f1aaf git Not specified
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca 1884ab3d22536a5c14b17c78c2ce76d1734e8b0b git Not specified
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca 9d9f5c75c0c7f31766ec27d90f7a6ac673193191 git Not specified
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca 492015e6249fbcd42138b49de3c588d826dd9648 git Not specified
CNA Linux Linux affected 27ce405039bfe6d3f4143415c638f56a3df77dca 177f25d1292c7e16e1199b39c85480f7f8815552 git Not specified
CNA Linux Linux affected b2b6cadad699d44a8a5b2a60f3d960e00d6fb3b7 git Not specified
CNA Linux Linux affected fe6c9b48ebc920ff21c10c50ab2729440c734254 git Not specified
CNA Linux Linux affected 3.12 Not specified
CNA Linux Linux unaffected 3.12 semver Not specified
CNA Linux Linux unaffected 4.19.324 4.19.* semver Not specified
CNA Linux Linux unaffected 5.4.286 5.4.* semver Not specified
CNA Linux Linux unaffected 5.10.230 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.172 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.117 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.61 6.6.* semver Not specified
CNA Linux Linux unaffected 6.11.8 6.11.* semver Not specified
CNA Linux Linux unaffected 6.12 * original_commit_for_fix Not specified
ADP Siemens RUGGEDCOM RST2428P unaffected * custom Not specified
ADP Siemens SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 Family unaffected * custom Not specified
ADP Siemens SCALANCE XCM-/XRM-/XCH-/XRH-300 Family unaffected * custom Not specified
ADP Siemens SIMATIC S7-1500 TM MFP - GNU/Linux Subsystem affected * custom Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/177f25d1292c7e16e1199b39c85480f7f8815552 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/e7ea60184e1e88a3c9e437b3265cbb6439aa7e26 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/9d9f5c75c0c7f31766ec27d90f7a6ac673193191 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
lists.debian.org/debian-lts-announce/2025/03/msg00002.html af854a3a-2127-422b-91ae-364da2661108 lists.debian.org Mailing List
git.kernel.org/stable/c/d7dc68d82ab3fcfc3f65322465da3d7031d4ab46 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
cert-portal.siemens.com/productcert/html/ssa-265688.html 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e cert-portal.siemens.com Third Party Advisory
git.kernel.org/stable/c/1884ab3d22536a5c14b17c78c2ce76d1734e8b0b 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/05ade5d4337867929e7ef664e7ac8e0c734f1aaf 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
cert-portal.siemens.com/productcert/html/ssa-355557.html 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e cert-portal.siemens.com Third Party Advisory
lists.debian.org/debian-lts-announce/2025/01/msg00001.html af854a3a-2127-422b-91ae-364da2661108 lists.debian.org Mailing List
git.kernel.org/stable/c/3f9e88f2672c4635960570ee9741778d4135ecf5 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/492015e6249fbcd42138b49de3c588d826dd9648 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
www.cisa.gov/known-exploited-vulnerabilities-catalog 134c704f-9b21-4f2e-91b3-4a467353bcc0 www.cisa.gov US Government Resource
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev

Additional Advisory Data

SourceTimeEvent
ADP2025-03-04T00:00:00.000ZCVE-2024-50302 added to CISA KEV
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report