In the Linux kernel, the following vulnerability has been resolved:
media: gspca: cpia1: shift-out-of-bounds in set_flicker
Syzkaller reported the following issue:
UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27
shift exponent 245 is too large for 32-bit type 'int'
When the value of the variable "sd->params.exposure.gain" exceeds the
number of bits in an integer, a shift-out-of-bounds error is reported. It
is triggered because the variable "currentexp" cannot be left-shifted by
more than the number of bits in an integer. In order to avoid invalid
range during left-shift, the conditional expression is added.
References
Configurations
Configuration 1 (hide)
|
History
23 Sep 2025, 19:52
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953 - Patch | |
References | () https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26 - Patch | |
References | () https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb - Patch | |
References | () https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060 - Patch | |
References | () https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b - Patch | |
References | () https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809 - Patch | |
References | () https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177 - Patch | |
References | () https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a - Patch | |
References | () https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953 - | |
References | () https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26 - | |
References | () https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb - | |
References | () https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060 - | |
References | () https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b - | |
References | () https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809 - | |
References | () https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177 - | |
References | () https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a - | |
References | () https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3 - |
21 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 16:15
Updated : 2025-09-23 19:52
NVD link : CVE-2023-52764
Mitre link : CVE-2023-52764
CVE.ORG link : CVE-2023-52764
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write