CVE-2023-53703

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/10/2025
Last modified:
22/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HID: amd_sfh: Fix for shift-out-of-bounds<br /> <br /> Shift operation of &amp;#39;exp&amp;#39; and &amp;#39;shift&amp;#39; variables exceeds the maximum number<br /> of shift values in the u32 range leading to UBSAN shift-out-of-bounds.<br /> <br /> ...<br /> [ 6.120512] UBSAN: shift-out-of-bounds in drivers/hid/amd-sfh-hid/sfh1_1/amd_sfh_desc.c:149:50<br /> [ 6.120598] shift exponent 104 is too large for 64-bit type &amp;#39;long unsigned int&amp;#39;<br /> [ 6.120659] CPU: 4 PID: 96 Comm: kworker/4:1 Not tainted 6.4.0amd_1-next-20230519-dirty #10<br /> [ 6.120665] Hardware name: AMD Birman-PHX/Birman-PHX, BIOS SFH_with_HPD_SEN.FD 04/05/2023<br /> [ 6.120667] Workqueue: events amd_sfh_work_buffer [amd_sfh]<br /> [ 6.120687] Call Trace:<br /> [ 6.120690] <br /> [ 6.120694] dump_stack_lvl+0x48/0x70<br /> [ 6.120704] dump_stack+0x10/0x20<br /> [ 6.120707] ubsan_epilogue+0x9/0x40<br /> [ 6.120716] __ubsan_handle_shift_out_of_bounds+0x10f/0x170<br /> [ 6.120720] ? psi_group_change+0x25f/0x4b0<br /> [ 6.120729] float_to_int.cold+0x18/0xba [amd_sfh]<br /> [ 6.120739] get_input_rep+0x57/0x340 [amd_sfh]<br /> [ 6.120748] ? __schedule+0xba7/0x1b60<br /> [ 6.120756] ? __pfx_get_input_rep+0x10/0x10 [amd_sfh]<br /> [ 6.120764] amd_sfh_work_buffer+0x91/0x180 [amd_sfh]<br /> [ 6.120772] process_one_work+0x229/0x430<br /> [ 6.120780] worker_thread+0x4a/0x3c0<br /> [ 6.120784] ? __pfx_worker_thread+0x10/0x10<br /> [ 6.120788] kthread+0xf7/0x130<br /> [ 6.120792] ? __pfx_kthread+0x10/0x10<br /> [ 6.120795] ret_from_fork+0x29/0x50<br /> [ 6.120804] <br /> ...<br /> <br /> Fix this by adding the condition to validate shift ranges.

Impact