Linux Kernel Out-of-Bounds Write Vulnerability (CVE-2024-53104)
Linux kernel contains an out-of-bounds write vulnerability in the uvc_parse_streaming component of the USB Video Class (UVC) driver that could allow for physical escalation of privilege.
A local attacker, with a low-privilege account, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2025-02-26 under CISA BOD 22-01.
This is a Out-of-bounds Write (CWE-787) vulnerability in Linux Kernel. In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming. Exploitation requires local access, low attack complexity, a low-privilege authenticated account, and no user interaction required.
Probably yes if any of these apply:
CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2025-02-05 based on evidence of active exploitation in the wild. Federal agencies required to remediate by 2025-02-26.
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.