CVE-2023-53703

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53703
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53703.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53703
Downstream
Related
Published
2025-10-22T13:23:41Z
Modified
2025-10-22T20:59:07.005285Z
Summary
HID: amd_sfh: Fix for shift-out-of-bounds
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Fix for shift-out-of-bounds

Shift operation of 'exp' and 'shift' variables exceeds the maximum number of shift values in the u32 range leading to UBSAN shift-out-of-bounds.

... [ 6.120512] UBSAN: shift-out-of-bounds in drivers/hid/amd-sfh-hid/sfh11/amdsfhdesc.c:149:50 [ 6.120598] shift exponent 104 is too large for 64-bit type 'long unsigned int' [ 6.120659] CPU: 4 PID: 96 Comm: kworker/4:1 Not tainted 6.4.0amd1-next-20230519-dirty #10 [ 6.120665] Hardware name: AMD Birman-PHX/Birman-PHX, BIOS SFHwithHPDSEN.FD 04/05/2023 [ 6.120667] Workqueue: events amdsfhworkbuffer [amdsfh] [ 6.120687] Call Trace: [ 6.120690] <TASK> [ 6.120694] dumpstacklvl+0x48/0x70 [ 6.120704] dumpstack+0x10/0x20 [ 6.120707] ubsanepilogue+0x9/0x40 [ 6.120716] _ubsanhandleshiftoutofbounds+0x10f/0x170 [ 6.120720] ? psigroupchange+0x25f/0x4b0 [ 6.120729] floattoint.cold+0x18/0xba [amdsfh] [ 6.120739] getinputrep+0x57/0x340 [amdsfh] [ 6.120748] ? _schedule+0xba7/0x1b60 [ 6.120756] ? _pfxgetinputrep+0x10/0x10 [amdsfh] [ 6.120764] amdsfhworkbuffer+0x91/0x180 [amdsfh] [ 6.120772] processonework+0x229/0x430 [ 6.120780] workerthread+0x4a/0x3c0 [ 6.120784] ? _pfxworkerthread+0x10/0x10 [ 6.120788] kthread+0xf7/0x130 [ 6.120792] ? _pfxkthread+0x10/0x10 [ 6.120795] retfrom_fork+0x29/0x50 [ 6.120804] </TASK> ...

Fix this by adding the condition to validate shift ranges.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
93ce5e0231d79189be4d9e5f9295807b18941419
Fixed
5a45ed1ae34bb0e68944471f4bafb68e0a572791
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
93ce5e0231d79189be4d9e5f9295807b18941419
Fixed
1e50bc2c177d4b2953d77037ac46ea0702d6aa1f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
93ce5e0231d79189be4d9e5f9295807b18941419
Fixed
87854366176403438d01f368b09de3ec2234e0f5

Affected versions

v5.*

v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.21
v6.1.22
v6.1.23
v6.1.24
v6.1.25
v6.1.26
v6.1.27
v6.1.28
v6.1.29
v6.1.3
v6.1.30
v6.1.31
v6.1.32
v6.1.33
v6.1.34
v6.1.35
v6.1.36
v6.1.37
v6.1.38
v6.1.39
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.3
v6.3-rc1
v6.3-rc2
v6.3-rc3
v6.3-rc4
v6.3-rc5
v6.3-rc6
v6.3-rc7
v6.4
v6.4-rc1
v6.4-rc2
v6.4-rc3
v6.4-rc4
v6.4-rc5
v6.4-rc6
v6.4-rc7
v6.4.1
v6.4.2
v6.4.3
v6.4.4

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.1.40
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.5