Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format can lead to out of bounds writes
CVE-2024-53104

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
2 December 2024

Badges

📈 Trended📈 Score: 8,040👾 Exploit Exists🦅 CISA Reported📰 News Worthy

What is CVE-2024-53104?

CVE-2024-53104 is a vulnerability identified within the Linux kernel’s UVC (USB Video Class) subsystem. This vulnerability arises from improper handling of specific video frame types during parsing operations, which can lead to out-of-bounds write conditions. Such an issue poses a significant risk to organizations relying on affected kernels, as it can allow attackers to execute arbitrary code, potentially leading to system compromise. With widespread usage of Linux in various applications, including servers, desktops, and embedded systems, this vulnerability can impact numerous entities that depend on Linux-based environments for their operations.

Technical Details

The vulnerability occurs in the function responsible for parsing video frames within the uvcvideo driver. Specifically, the UVC_VS_UNDEFINED frame type was not appropriately considered when calculating the size of the frames buffer in the uvc_parse_streaming function. This oversight can allow an attacker to write data outside the allocated memory bounds, leading to potential memory corruption and instability in the kernel. The Linux kernel team has acknowledged this flaw and has provided fixes in subsequent updates to mitigate the risk associated with this vulnerability.

Potential impact of CVE-2024-53104

  1. Arbitrary Code Execution: The primary risk associated with this vulnerability is the potential for arbitrary code execution. An attacker who successfully exploits this flaw could take control of the affected system, leading to unauthorized access to sensitive data and further exploitation.

  2. System Instability and Crashes: Since the vulnerability can cause out-of-bounds writes, it may lead to system instability. This could result in random crashes, data corruption, or denial of service, disrupting organizational operations.

  3. Increased Attack Surface: The presence of this vulnerability in widely used Linux kernel versions opens a larger attack surface for malicious actors. As organizations increasingly rely on Linux-based systems, the exploitation of this vulnerability can facilitate further attacks, including those orchestrated by ransomware groups targeting vulnerable systems.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Linux c0efd232929c2cd87238de2cccdaf4e845be5b0c < 95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8

Linux c0efd232929c2cd87238de2cccdaf4e845be5b0c < 684022f81f128338fe3587ec967459669a1204ae

Linux c0efd232929c2cd87238de2cccdaf4e845be5b0c

News Articles

Samsung Update Surprises Galaxy S25 Buyers—You Will Miss Deadline

Samsung’s new flagship comes with a nasty surprise—here’s what to know.

6 days ago

Google Pixel Deadline—21 Days To Update Or Stop Using Your Phone

Government update warning comes as attacks are confirmed underway.

1 week ago

Linux kernel flaw added to CISA's exploited vulnerabilities list

Flaw could let attackers escalate privileges on popular Google Android and Pixel devices.

1 week ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🦅

    CISA Reported

  • 📈

    Vulnerability started trending

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by SecurityWeek

  • Vulnerability published

  • Vulnerability Reserved

.