CVE-2024-53104
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- November 19, 2024
- Published Date
- December 02, 2024
- Last Updated
- February 06, 2025
- Vendor
- Linux
- Product
- Linux
- Description
- In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.
- Tags
- Exploitation
- active
- Technical Impact
- total
- Exploited in the Wild
- Yes (2025-02-05 00:00:00 UTC) Source
linux
cisa
CVSS Scores
CVSS v3.1
7.8 - HIGH
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SSVC Information
Exploit Status
References
https://git.kernel.org/stable/c/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8
https://git.kernel.org/stable/c/684022f81f128338fe3587ec967459669a1204ae
https://git.kernel.org/stable/c/faff5bbb2762c44ec7426037b3000e77a11d6773
https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29
https://git.kernel.org/stable/c/beced2cb09b58c1243733f374c560a55382003d6
https://git.kernel.org/stable/c/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d
https://git.kernel.org/stable/c/622ad10aae5f5e03b7927ea95f7f32812f692bb5
https://git.kernel.org/stable/c/1ee9d9122801eb688783acd07791f2906b87cb4f
https://git.kernel.org/stable/c/ecf2b43018da9579842c774b7f35dbe11b5c38dd
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2025-02-05 00:00:00 UTC |
Recent Mentions
Written by: Casey Charrier, James Sadowski, Clement Lecigne, Vlad Stolyarov Executive Summary Google Threat Intelligence Group (GTIG) tracked 75...
Source: Google Threat Intelligence • Published: 2025-04-29 05:00:00 UTC
Written by: Casey Charrier, James Sadowski, Clement Lecigne, Vlad Stolyarov
Executive Summary
Google Threat Intelligence Group (GTIG) tracked 75 zero-day vulnerabilities exploited in the wild in 2024, a decrease from the number we identified in 2023 (98 vulnerabilities), but still an increase from 2022 (63 vulnerabilities). We divided the reviewed vulnerabilities into two main categories: end-user platforms and products (e.g., mobile devices, operating systems, and browsers) and enterprise-focused technologies, such as security software and appliances.
Vendors continue to drive improvements that make some zero-day exploitation harder, demonstrated by both dwindling numbers across multiple categories and reduced observed attacks against previously popular targets. At the same time, commercial surveillance vendors (CSVs) appear to be increasing their operational security practices, potentially leading to decreased attribution and detection.
We see zero-day exploitation targeting a greater number and wider variety of enterprise-specific technologies, although these technologies still remain a smaller proportion of overall exploitation when compared to end-user technologies. While the historic focus on the exploitation of popular end-user technologies and their users continues, the shift toward increased targeting of enterprise-focused products will require a wider and more diverse set of vendors to increase proactive security measures in order to reduce future zero-day exploitation attempts.
For a deeper look at the trends discussed in this report, along with recommendations for defenders, register for our upcoming zero-day webinar.
Scope
This report describes what Google Threat Intelligence Group (GTIG) knows about zero-day exploitation in 2024. We discuss how targeted vendors and exploited products drive trends that reflect threat actor goals and shifting exploitation approaches, and then closely examine several examples of zero-day exploitation from...
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel