U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!

CVE-2023-52764 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: media: gspca: cpia1: shift-out-of-bounds in set_flicker Syzkaller reported the following issue: UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27 shift exponent 245 is too large for 32-bit type 'int' When the value of the variable "sd->params.exposure.gain" exceeds the number of bits in an integer, a shift-out-of-bounds error is reported. It is triggered because the variable "currentexp" cannot be left-shifted by more than the number of bits in an integer. In order to avoid invalid range during left-shift, the conditional expression is added.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953
https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26
https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb
https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060
https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b
https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809
https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177
https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a
https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52764
NVD Published Date:
05/21/2024
NVD Last Modified:
05/21/2024
Source:
kernel.org