CVE-2023-52816

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-52816
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52816.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52816
Downstream
Related
Published
2024-05-21T16:15:19Z
Modified
2025-09-23T22:43:36Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix shift out-of-bounds issue

[ 567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int' [ 567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G OE 6.2.0-34-generic #34~22.04.1-Ubuntu [ 567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N871 09/25/2023 [ 567.614504] Workqueue: events sendexceptionworkhandler [amdgpu] [ 567.614748] Call Trace: [ 567.614750] <TASK> [ 567.614753] dumpstacklvl+0x48/0x70 [ 567.614761] dumpstack+0x10/0x20 [ 567.614763] ubsanhandleshiftoutofbounds+0x156/0x310 [ 567.614769] ? srsoaliasreturnthunk+0x5/0x7f [ 567.614773] ? updatesdlbstats.constprop.0+0xf2/0x3c0 [ 567.614780] svmrangesplitbygranularity.cold+0x2b/0x34 [amdgpu] [ 567.615047] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615052] svmmigratetoram+0x185/0x4d0 [amdgpu] [ 567.615286] doswappage+0x7b6/0xa30 [ 567.615291] ? srsoaliasreturnthunk+0x5/0x7f [ 567.615294] ? _freepages+0x119/0x130 [ 567.615299] handleptefault+0x227/0x280 [ 567.615303] _handlemmfault+0x3c0/0x720 [ 567.615311] handlemmfault+0x119/0x330 [ 567.615314] ? lockmmandfindvma+0x44/0x250 [ 567.615318] douseraddrfault+0x1a9/0x640 [ 567.615323] excpagefault+0x81/0x1b0 [ 567.615328] asmexcpagefault+0x27/0x30 [ 567.615332] RIP: 0010:getuser8+0x1c/0x30

References

Affected packages