![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2023-52816 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix shift out-of-bounds issue [ 567.613292] shift exponent
255 is too large for 64-bit type 'long unsigned int' [ 567.614498]
CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G OE 6.2.0-34-generic
#34~22.04.1-Ubuntu [ 567.614502] Hardware name: AMD Splinter/Splinter-
RPL, BIOS WS43927N_871 09/25/2023 [ 567.614504] Workqueue: events
send_exception_work_handler [amdgpu] [ 567.614748] Call Trace: [
567.614750] |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-52816 https://git.kernel.org/stable/c/2806f880379232e789957c2078d612669eb7a69c https://git.kernel.org/stable/c/2806f880379232e789957c2078d612669eb7a69c https://git.kernel.org/stable/c/282c1d793076c2edac6c3db51b7e8ed2b41d60a5 https://git.kernel.org/stable/c/282c1d793076c2edac6c3db51b7e8ed2b41d60a5 https://git.kernel.org/stable/c/3f7a400d5e80f99581e3e8a9843e1f6118bf454f https://git.kernel.org/stable/c/3f7a400d5e80f99581e3e8a9843e1f6118bf454f https://git.kernel.org/stable/c/56649c43d40ce0147465a2d5756d300e87f9ee1c https://git.kernel.org/stable/c/56649c43d40ce0147465a2d5756d300e87f9ee1c https://git.kernel.org/stable/c/d33a35b13cbfec3238043f196fa87a6384f9d087 https://git.kernel.org/stable/c/d33a35b13cbfec3238043f196fa87a6384f9d087 |