PT-2024-35568 · Linux +10 · Linux Kernel +10
Benoit Sevens
·
Published
2024-11-07
·
Updated
2025-07-15
·
CVE-2024-53104
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux kernel versions prior to the fixed version
Description:
A vulnerability in the Linux kernel's USB Video Class driver can lead to out-of-bounds writes, allowing an attacker to escalate privileges or execute arbitrary code. The vulnerability is caused by incorrect parsing of an undefined frame type in the `uvc parse format` function. This can be exploited by an attacker who can influence the format of video streams captured by a system's USB video device.
Recommendations:
To resolve the issue, update the Linux kernel to the latest version that includes the fix for this vulnerability. Additionally, consider disabling or restricting the use of the vulnerable USB Video Class driver until a patch is available. Avoid using unknown or untrusted USB devices, and use trusted charging only to minimize the risk of exploitation.
Fix
LPE
Out of bounds Read
Memory Corruption
Related Identifiers
Affected Products
References · 7034
- https://bdu.fstec.ru/vul/2025-04994 · Security Note
- https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0411SE18 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-01047 · Security Note
- https://ubuntu.com/security/CVE-2024-50124 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53136 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56544 · Security Note
- https://ubuntu.com/security/CVE-2024-40965 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-53140 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/716804 · Security Note
- https://bdu.fstec.ru/vul/2025-07901 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49923 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50275 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814 · Security Note
- https://ubuntu.com/security/CVE-2024-47728 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53074 · Security Note