Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format can lead to out of bounds writes
CVE-2024-53104

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
2 December 2024

Badges

🔥 Trending now📈 Trended📈 Score: 5,540👾 Exploit Exists📰 News Worthy

What is CVE-2024-53104?

CVE-2024-53104 is a vulnerability identified within the Linux kernel’s UVC (USB Video Class) subsystem. This vulnerability arises from improper handling of specific video frame types during parsing operations, which can lead to out-of-bounds write conditions. Such an issue poses a significant risk to organizations relying on affected kernels, as it can allow attackers to execute arbitrary code, potentially leading to system compromise. With widespread usage of Linux in various applications, including servers, desktops, and embedded systems, this vulnerability can impact numerous entities that depend on Linux-based environments for their operations.

Technical Details

The vulnerability occurs in the function responsible for parsing video frames within the uvcvideo driver. Specifically, the UVC_VS_UNDEFINED frame type was not appropriately considered when calculating the size of the frames buffer in the uvc_parse_streaming function. This oversight can allow an attacker to write data outside the allocated memory bounds, leading to potential memory corruption and instability in the kernel. The Linux kernel team has acknowledged this flaw and has provided fixes in subsequent updates to mitigate the risk associated with this vulnerability.

Potential impact of CVE-2024-53104

  1. Arbitrary Code Execution: The primary risk associated with this vulnerability is the potential for arbitrary code execution. An attacker who successfully exploits this flaw could take control of the affected system, leading to unauthorized access to sensitive data and further exploitation.

  2. System Instability and Crashes: Since the vulnerability can cause out-of-bounds writes, it may lead to system instability. This could result in random crashes, data corruption, or denial of service, disrupting organizational operations.

  3. Increased Attack Surface: The presence of this vulnerability in widely used Linux kernel versions opens a larger attack surface for malicious actors. As organizations increasingly rely on Linux-based systems, the exploitation of this vulnerability can facilitate further attacks, including those orchestrated by ransomware groups targeting vulnerable systems.

Affected Version(s)

Linux c0efd232929c2cd87238de2cccdaf4e845be5b0c < 95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8

Linux c0efd232929c2cd87238de2cccdaf4e845be5b0c < 684022f81f128338fe3587ec967459669a1204ae

Linux c0efd232929c2cd87238de2cccdaf4e845be5b0c

News Articles

Android security update includes patch for actively exploited vulnerability 

Google has addressed a total of 47 security vulnerabilities in its February update for the Android operating system.

17 hours ago

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a total of 47 vulnerabilities affecting Android devices.

18 hours ago

Google warns Android users of a kernel flaw under attack

Google has released its February Android security updates, including a fix for a high-severity kernel-level vulnerability, which is suspected to be in use by targeted exploits. The flaw, CVE-2024-53104, is an...

1 day ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📈

    Vulnerability started trending

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by SecurityWeek

  • Vulnerability published

  • Vulnerability Reserved

.