Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-50302

Опубликовано: 19 нояб. 2024
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.

A vulnerability was found in the Linux kernel's driver for Human Interface Devices. This flaw allows an attacker to use a malicious input device to read information from the report buffer. This could be used to leak kernel memory, enabling the exploitation of additional vulnerabilities.

Отчет

While this vulnerability could lead to disclosure of kernel memory, the impact is rated Moderate because exploitation requires bypassing additional security features such as kernel address-space layout randomization (KASLR). It could be exploited by an authenticated, local attacker who emulates a malicious Human Interface Device (HID). Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-908: Use of Uninitialized Resource vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive settings necessary for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that support automated detection of application crashes, data corruption, or inconsistent behavior caused by uninitialized resources. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing uninitialized variables or resources in one process from affecting others.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 10kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected
Red Hat Enterprise Linux 6 Extended Lifecycle Support - EXTENSIONkernelFixedRHSA-2025:251710.03.2025
Red Hat Enterprise Linux 7.7 Advanced Update SupportkernelFixedRHSA-2025:251410.03.2025
Red Hat Enterprise Linux 7 Extended Lifecycle Supportkernel-rtFixedRHSA-2025:251010.03.2025
Red Hat Enterprise Linux 7 Extended Lifecycle SupportkernelFixedRHSA-2025:250110.03.2025
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2025:247410.03.2025
Red Hat Enterprise Linux 8kernelFixedRHSA-2025:247310.03.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2025:264611.03.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-908
https://bugzilla.redhat.com/show_bug.cgi?id=2327169kernel: HID: core: zero-initialize the report buffer

EPSS

Процентиль: 44%
0.00213
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.

CVSS3: 5.5
nvd
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.

CVSS3: 5.5
msrc
3 месяца назад

Описание отсутствует

CVSS3: 5.5
debian
7 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: H ...

suse-cvrf
3 месяца назад

Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3)

EPSS

Процентиль: 44%
0.00213
Низкий

6.1 Medium

CVSS3

Уязвимость CVE-2024-50302