CVE-2023-52764

In the Linux kernel, the following vulnerability has been resolved: media: gspca: cpia1: shift-out-of-bounds in set_flicker Syzkaller reported the following issue: UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27 shift exponent 245 is too large for 32-bit type 'int' When the value of the variable "sd->params.exposure.gain" exceeds the number of bits in an integer, a shift-out-of-bounds error is reported. It is triggered because the variable "currentexp" cannot be left-shifted by more than the number of bits in an integer. In order to avoid invalid range during left-shift, the conditional expression is added.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Sep 2025, 19:52

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953 - () https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953 - Patch
References () https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26 - () https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26 - Patch
References () https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb - () https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb - Patch
References () https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060 - () https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060 - Patch
References () https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b - () https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b - Patch
References () https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809 - () https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809 - Patch
References () https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177 - () https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177 - Patch
References () https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a - () https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a - Patch
References () https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3 - () https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3 - Patch
CWE CWE-787

Information

Published : 2024-05-21 16:15

Updated : 2025-09-23 19:52


NVD link : CVE-2023-52764

Mitre link : CVE-2023-52764

CVE.ORG link : CVE-2023-52764


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write