cve-2024-53104
Vulnerability from cvelistv5
Published
2024-12-02 07:29
Modified
2025-02-06 04:55
Summary
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming.
Impacted products
Vendor Product Version
Linux Linux Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Version: c0efd232929c2cd87238de2cccdaf4e845be5b0c
Create a notification for this product.
   Linux Linux Version: 2.6.26
Create a notification for this product.
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog

Date added: 2025-02-05

Due date: 2025-02-26

Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Used in ransomware: Unknown

Notes: https://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-53104

Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-53104",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-05T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2025-02-05",
                "reference": "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-06T04:55:20.943Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "timeline": [
          {
            "lang": "en",
            "time": "2025-02-05T00:00:00+00:00",
            "value": "CVE-2024-53104 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/media/usb/uvc/uvc_driver.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "684022f81f128338fe3587ec967459669a1204ae",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "faff5bbb2762c44ec7426037b3000e77a11d6773",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "467d84dc78c9abf6b217ada22b3fdba336262e29",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "beced2cb09b58c1243733f374c560a55382003d6",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "575a562f7a3ec2d54ff77ab6810e3fbceef2a91d",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "622ad10aae5f5e03b7927ea95f7f32812f692bb5",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "1ee9d9122801eb688783acd07791f2906b87cb4f",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            },
            {
              "lessThan": "ecf2b43018da9579842c774b7f35dbe11b5c38dd",
              "status": "affected",
              "version": "c0efd232929c2cd87238de2cccdaf4e845be5b0c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/media/usb/uvc/uvc_driver.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.26"
            },
            {
              "lessThan": "2.6.26",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.324",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.286",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.230",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.172",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.117",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.61",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format\n\nThis can lead to out of bounds writes since frames of this type were not\ntaken into account when calculating the size of the frames buffer in\nuvc_parse_streaming."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-20T06:19:37.825Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8"
        },
        {
          "url": "https://git.kernel.org/stable/c/684022f81f128338fe3587ec967459669a1204ae"
        },
        {
          "url": "https://git.kernel.org/stable/c/faff5bbb2762c44ec7426037b3000e77a11d6773"
        },
        {
          "url": "https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29"
        },
        {
          "url": "https://git.kernel.org/stable/c/beced2cb09b58c1243733f374c560a55382003d6"
        },
        {
          "url": "https://git.kernel.org/stable/c/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d"
        },
        {
          "url": "https://git.kernel.org/stable/c/622ad10aae5f5e03b7927ea95f7f32812f692bb5"
        },
        {
          "url": "https://git.kernel.org/stable/c/1ee9d9122801eb688783acd07791f2906b87cb4f"
        },
        {
          "url": "https://git.kernel.org/stable/c/ecf2b43018da9579842c774b7f35dbe11b5c38dd"
        }
      ],
      "title": "media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-53104",
    "datePublished": "2024-12-02T07:29:27.261Z",
    "dateReserved": "2024-11-19T17:17:24.985Z",
    "dateUpdated": "2025-02-06T04:55:20.943Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2024-53104",
      "cwes": "[\"CWE-787\"]",
      "dateAdded": "2025-02-05",
      "dueDate": "2025-02-26",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-53104",
      "product": "Kernel",
      "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "shortDescription": "Linux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.",
      "vendorProject": "Linux",
      "vulnerabilityName": "Linux Kernel Out-of-Bounds Write Vulnerability"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-53104\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-02T08:15:08.687\",\"lastModified\":\"2025-02-06T02:00:02.120\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format\\n\\nThis can lead to out of bounds writes since frames of this type were not\\ntaken into account when calculating the size of the frames buffer in\\nuvc_parse_streaming.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: uvcvideo: Omitir el an\u00e1lisis de fotogramas de tipo UVC_VS_UNDEFINED en uvc_parse_format Esto puede provocar escrituras fuera de los l\u00edmites, ya que los fotogramas de este tipo no se tuvieron en cuenta al calcular el tama\u00f1o del b\u00fafer de fotogramas en uvc_parse_streaming.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2025-02-05\",\"cisaActionDue\":\"2025-02-26\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Linux Kernel Out-of-Bounds Write Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.26\",\"versionEndExcluding\":\"4.19.324\",\"matchCriteriaId\":\"68D54A7F-73FB-4CC5-AA42-317A87945790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.286\",\"matchCriteriaId\":\"9952C897-8A61-4D4B-9D6D-7D063E9EA15E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.230\",\"matchCriteriaId\":\"BF5B32D0-72C9-41C3-A0BB-D4946153C134\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.172\",\"matchCriteriaId\":\"88812664-4296-42AC-AE0F-ED71086C1BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.117\",\"matchCriteriaId\":\"0DD7F755-2F6B-4707-8973-78496AD5AA8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.61\",\"matchCriteriaId\":\"630ED7EB-C97E-4435-B884-1E309E40D6F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.11.8\",\"matchCriteriaId\":\"0BD000F7-3DAD-4DD3-8906-98EA1EC67E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12\",\"versionEndExcluding\":\"6.12.1\",\"matchCriteriaId\":\"822EAD12-FA29-4559-BAC2-8AEFC53F6D37\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1ee9d9122801eb688783acd07791f2906b87cb4f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/622ad10aae5f5e03b7927ea95f7f32812f692bb5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/684022f81f128338fe3587ec967459669a1204ae\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/beced2cb09b58c1243733f374c560a55382003d6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ecf2b43018da9579842c774b7f35dbe11b5c38dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/faff5bbb2762c44ec7426037b3000e77a11d6773\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53104\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-05T16:02:26.658377Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2025-02-05\", \"reference\": \"https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-11T14:50:56.530Z\"}, \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-02-05T00:00:00+00:00\", \"value\": \"CVE-2024-53104 added to CISA KEV\"}]}], \"cna\": {\"title\": \"media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"684022f81f128338fe3587ec967459669a1204ae\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"faff5bbb2762c44ec7426037b3000e77a11d6773\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"467d84dc78c9abf6b217ada22b3fdba336262e29\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"beced2cb09b58c1243733f374c560a55382003d6\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"575a562f7a3ec2d54ff77ab6810e3fbceef2a91d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"622ad10aae5f5e03b7927ea95f7f32812f692bb5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"1ee9d9122801eb688783acd07791f2906b87cb4f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c0efd232929c2cd87238de2cccdaf4e845be5b0c\", \"lessThan\": \"ecf2b43018da9579842c774b7f35dbe11b5c38dd\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/media/usb/uvc/uvc_driver.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6.26\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"2.6.26\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.324\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.286\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.230\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.172\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.117\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.61\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/media/usb/uvc/uvc_driver.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8\"}, {\"url\": \"https://git.kernel.org/stable/c/684022f81f128338fe3587ec967459669a1204ae\"}, {\"url\": \"https://git.kernel.org/stable/c/faff5bbb2762c44ec7426037b3000e77a11d6773\"}, {\"url\": \"https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29\"}, {\"url\": \"https://git.kernel.org/stable/c/beced2cb09b58c1243733f374c560a55382003d6\"}, {\"url\": \"https://git.kernel.org/stable/c/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d\"}, {\"url\": \"https://git.kernel.org/stable/c/622ad10aae5f5e03b7927ea95f7f32812f692bb5\"}, {\"url\": \"https://git.kernel.org/stable/c/1ee9d9122801eb688783acd07791f2906b87cb4f\"}, {\"url\": \"https://git.kernel.org/stable/c/ecf2b43018da9579842c774b7f35dbe11b5c38dd\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format\\n\\nThis can lead to out of bounds writes since frames of this type were not\\ntaken into account when calculating the size of the frames buffer in\\nuvc_parse_streaming.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-01-20T06:19:37.825Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-53104\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-06T04:55:20.943Z\", \"dateReserved\": \"2024-11-19T17:17:24.985Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-12-02T07:29:27.261Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.