CVE-2023-52764
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
21/05/2024
Last modified:
23/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: gspca: cpia1: shift-out-of-bounds in set_flicker<br />
<br />
Syzkaller reported the following issue:<br />
UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27<br />
shift exponent 245 is too large for 32-bit type &#39;int&#39;<br />
<br />
When the value of the variable "sd->params.exposure.gain" exceeds the<br />
number of bits in an integer, a shift-out-of-bounds error is reported. It<br />
is triggered because the variable "currentexp" cannot be left-shifted by<br />
more than the number of bits in an integer. In order to avoid invalid<br />
range during left-shift, the conditional expression is added.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14.331 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.300 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.262 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.202 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.140 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.5.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953
- https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26
- https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb
- https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060
- https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b
- https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809
- https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177
- https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a
- https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3
- https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953
- https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26
- https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb
- https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060
- https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b
- https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809
- https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177
- https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a
- https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3



