In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size()").
https://git.kernel.org/stable/c/d50b3c73f1ac20dabc53dc6e9d64ce9c79a331eb
https://git.kernel.org/stable/c/a183905869e692b6b7805b7472235585eff8e429
https://git.kernel.org/stable/c/9ad3221c86cc9c6305594b742d4a72dfbd4ea579
https://git.kernel.org/stable/c/9911be2155720221a4f1f722b22bd0e2388d8bcf
https://git.kernel.org/stable/c/8feca625900777e02a449e53fe4121339934c38a
https://git.kernel.org/stable/c/3d5ae269c4bd392ec1edbfb3bd031b8f42d7feff
https://git.kernel.org/stable/c/3ce0df3493277b9df275cb8455d9c677ae701230
https://git.kernel.org/stable/c/196a6df08b08699ace4ce70e1efcdd9081b6565f