In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix shift out-of-bounds issue
[ 567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int' [ 567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G OE 6.2.0-34-generic #34~22.04.1-Ubuntu [ 567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N871 09/25/2023 [ 567.614504] Workqueue: events sendexceptionworkhandler [amdgpu] [ 567.614748] Call Trace: [ 567.614750] <TASK> [ 567.614753] dumpstacklvl+0x48/0x70 [ 567.614761] dumpstack+0x10/0x20 [ 567.614763] ubsanhandleshiftoutofbounds+0x156/0x310 [ 567.614769] ? srsoaliasreturnthunk+0x5/0x7f [ 567.614773] ? updatesdlbstats.constprop.0+0xf2/0x3c0 [ 567.614780] svmrangesplitbygranularity.cold+0x2b/0x34 [amdgpu] [ 567.615047] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615052] svmmigratetoram+0x185/0x4d0 [amdgpu] [ 567.615286] doswappage+0x7b6/0xa30 [ 567.615291] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615294] ? _freepages+0x119/0x130 [ 567.615299] handleptefault+0x227/0x280 [ 567.615303] _handlemmfault+0x3c0/0x720 [ 567.615311] handlemmfault+0x119/0x330 [ 567.615314] ? lockmmandfindvma+0x44/0x250 [ 567.615318] douseraddrfault+0x1a9/0x640 [ 567.615323] excpagefault+0x81/0x1b0 [ 567.615328] asmexcpagefault+0x27/0x30 [ 567.615332] RIP: 0010:getuser8+0x1c/0x30