In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix shift out-of-bounds issue
[ 567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int' [ 567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G OE 6.2.0-34-generic #34~22.04.1-Ubuntu [ 567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N871 09/25/2023 [ 567.614504] Workqueue: events sendexceptionworkhandler [amdgpu] [ 567.614748] Call Trace: [ 567.614750] <TASK> [ 567.614753] dumpstacklvl+0x48/0x70 [ 567.614761] dumpstack+0x10/0x20 [ 567.614763] ubsanhandleshiftoutofbounds+0x156/0x310 [ 567.614769] ? srsoaliasreturnthunk+0x5/0x7f [ 567.614773] ? updatesdlbstats.constprop.0+0xf2/0x3c0 [ 567.614780] svmrangesplitbygranularity.cold+0x2b/0x34 [amdgpu] [ 567.615047] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615052] svmmigratetoram+0x185/0x4d0 [amdgpu] [ 567.615286] doswappage+0x7b6/0xa30 [ 567.615291] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615294] ? _freepages+0x119/0x130 [ 567.615299] handleptefault+0x227/0x280 [ 567.615303] _handlemmfault+0x3c0/0x720 [ 567.615311] handlemmfault+0x119/0x330 [ 567.615314] ? lockmmandfindvma+0x44/0x250 [ 567.615318] douseraddrfault+0x1a9/0x640 [ 567.615323] excpagefault+0x81/0x1b0 [ 567.615328] asmexcpagefault+0x27/0x30 [ 567.615332] RIP: 0010:getuser8+0x1c/0x30
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c", "function": "svm_range_apply_attrs" }, "id": "CVE-2023-52816-381e8bc4", "digest": { "length": 1373.0, "function_hash": "70843515011666187916247761136881771012" }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2806f880379232e789957c2078d612669eb7a69c" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c" }, "id": "CVE-2023-52816-4888b4f1", "digest": { "line_hashes": [ "145004097479313757881630819585161631589", "272459666495375772592551863951662827439", "310305668494707423717947669054933747511", "148108722293208883726594207041830962125" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2806f880379232e789957c2078d612669eb7a69c" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c" }, "id": "CVE-2023-52816-5a2654d3", "digest": { "line_hashes": [ "145004097479313757881630819585161631589", "272459666495375772592551863951662827439", "310305668494707423717947669054933747511", "148108722293208883726594207041830962125" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56649c43d40ce0147465a2d5756d300e87f9ee1c" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c" }, "id": "CVE-2023-52816-87530d94", "digest": { "line_hashes": [ "145004097479313757881630819585161631589", "272459666495375772592551863951662827439", "310305668494707423717947669054933747511", "148108722293208883726594207041830962125" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d33a35b13cbfec3238043f196fa87a6384f9d087" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c", "function": "svm_range_apply_attrs" }, "id": "CVE-2023-52816-9364e3a0", "digest": { "length": 1405.0, "function_hash": "273760543576454917526637516068258082505" }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56649c43d40ce0147465a2d5756d300e87f9ee1c" }, { "deprecated": false, "signature_type": "Line", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c" }, "id": "CVE-2023-52816-b0437e24", "digest": { "line_hashes": [ "145004097479313757881630819585161631589", "272459666495375772592551863951662827439", "310305668494707423717947669054933747511", "148108722293208883726594207041830962125" ], "threshold": 0.9 }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@282c1d793076c2edac6c3db51b7e8ed2b41d60a5" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c", "function": "svm_range_apply_attrs" }, "id": "CVE-2023-52816-df5c2e0a", "digest": { "length": 1405.0, "function_hash": "273760543576454917526637516068258082505" }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@282c1d793076c2edac6c3db51b7e8ed2b41d60a5" }, { "deprecated": false, "signature_type": "Function", "target": { "file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c", "function": "svm_range_apply_attrs" }, "id": "CVE-2023-52816-f1966463", "digest": { "length": 1405.0, "function_hash": "273760543576454917526637516068258082505" }, "signature_version": "v1", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d33a35b13cbfec3238043f196fa87a6384f9d087" } ] }