In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix shift out-of-bounds issue
[ 567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int' [ 567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G OE 6.2.0-34-generic #34~22.04.1-Ubuntu [ 567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N871 09/25/2023 [ 567.614504] Workqueue: events sendexceptionworkhandler [amdgpu] [ 567.614748] Call Trace: [ 567.614750] <TASK> [ 567.614753] dumpstacklvl+0x48/0x70 [ 567.614761] dumpstack+0x10/0x20 [ 567.614763] ubsanhandleshiftoutofbounds+0x156/0x310 [ 567.614769] ? srsoaliasreturnthunk+0x5/0x7f [ 567.614773] ? updatesdlbstats.constprop.0+0xf2/0x3c0 [ 567.614780] svmrangesplitbygranularity.cold+0x2b/0x34 [amdgpu] [ 567.615047] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615052] svmmigratetoram+0x185/0x4d0 [amdgpu] [ 567.615286] doswappage+0x7b6/0xa30 [ 567.615291] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615294] ? _freepages+0x119/0x130 [ 567.615299] handleptefault+0x227/0x280 [ 567.615303] _handlemmfault+0x3c0/0x720 [ 567.615311] handlemmfault+0x119/0x330 [ 567.615314] ? lockmmandfindvma+0x44/0x250 [ 567.615318] douseraddrfault+0x1a9/0x640 [ 567.615323] excpagefault+0x81/0x1b0 [ 567.615328] asmexcpagefault+0x27/0x30 [ 567.615332] RIP: 0010:getuser8+0x1c/0x30
[
{
"signature_type": "Function",
"id": "CVE-2023-52816-381e8bc4",
"target": {
"function": "svm_range_apply_attrs",
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2806f880379232e789957c2078d612669eb7a69c",
"digest": {
"function_hash": "70843515011666187916247761136881771012",
"length": 1373.0
}
},
{
"signature_type": "Line",
"id": "CVE-2023-52816-4888b4f1",
"target": {
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2806f880379232e789957c2078d612669eb7a69c",
"digest": {
"threshold": 0.9,
"line_hashes": [
"145004097479313757881630819585161631589",
"272459666495375772592551863951662827439",
"310305668494707423717947669054933747511",
"148108722293208883726594207041830962125"
]
}
},
{
"signature_type": "Line",
"id": "CVE-2023-52816-5a2654d3",
"target": {
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56649c43d40ce0147465a2d5756d300e87f9ee1c",
"digest": {
"threshold": 0.9,
"line_hashes": [
"145004097479313757881630819585161631589",
"272459666495375772592551863951662827439",
"310305668494707423717947669054933747511",
"148108722293208883726594207041830962125"
]
}
},
{
"signature_type": "Function",
"id": "CVE-2023-52816-72b0a44a",
"target": {
"function": "svm_range_apply_attrs",
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f7a400d5e80f99581e3e8a9843e1f6118bf454f",
"digest": {
"function_hash": "330613182589579102830393403115990497344",
"length": 1306.0
}
},
{
"signature_type": "Line",
"id": "CVE-2023-52816-87530d94",
"target": {
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d33a35b13cbfec3238043f196fa87a6384f9d087",
"digest": {
"threshold": 0.9,
"line_hashes": [
"145004097479313757881630819585161631589",
"272459666495375772592551863951662827439",
"310305668494707423717947669054933747511",
"148108722293208883726594207041830962125"
]
}
},
{
"signature_type": "Function",
"id": "CVE-2023-52816-9364e3a0",
"target": {
"function": "svm_range_apply_attrs",
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@56649c43d40ce0147465a2d5756d300e87f9ee1c",
"digest": {
"function_hash": "273760543576454917526637516068258082505",
"length": 1405.0
}
},
{
"signature_type": "Line",
"id": "CVE-2023-52816-99dd0941",
"target": {
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f7a400d5e80f99581e3e8a9843e1f6118bf454f",
"digest": {
"threshold": 0.9,
"line_hashes": [
"145004097479313757881630819585161631589",
"272459666495375772592551863951662827439",
"310305668494707423717947669054933747511",
"148108722293208883726594207041830962125"
]
}
},
{
"signature_type": "Line",
"id": "CVE-2023-52816-b0437e24",
"target": {
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@282c1d793076c2edac6c3db51b7e8ed2b41d60a5",
"digest": {
"threshold": 0.9,
"line_hashes": [
"145004097479313757881630819585161631589",
"272459666495375772592551863951662827439",
"310305668494707423717947669054933747511",
"148108722293208883726594207041830962125"
]
}
},
{
"signature_type": "Function",
"id": "CVE-2023-52816-df5c2e0a",
"target": {
"function": "svm_range_apply_attrs",
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@282c1d793076c2edac6c3db51b7e8ed2b41d60a5",
"digest": {
"function_hash": "273760543576454917526637516068258082505",
"length": 1405.0
}
},
{
"signature_type": "Function",
"id": "CVE-2023-52816-f1966463",
"target": {
"function": "svm_range_apply_attrs",
"file": "drivers/gpu/drm/amd/amdkfd/kfd_svm.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d33a35b13cbfec3238043f196fa87a6384f9d087",
"digest": {
"function_hash": "273760543576454917526637516068258082505",
"length": 1405.0
}
}
]