CVE-2023-54168

medium

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size()").

References

https://git.kernel.org/stable/c/d50b3c73f1ac20dabc53dc6e9d64ce9c79a331eb

https://git.kernel.org/stable/c/a183905869e692b6b7805b7472235585eff8e429

https://git.kernel.org/stable/c/9ad3221c86cc9c6305594b742d4a72dfbd4ea579

https://git.kernel.org/stable/c/9911be2155720221a4f1f722b22bd0e2388d8bcf

https://git.kernel.org/stable/c/8feca625900777e02a449e53fe4121339934c38a

https://git.kernel.org/stable/c/3d5ae269c4bd392ec1edbfb3bd031b8f42d7feff

https://git.kernel.org/stable/c/3ce0df3493277b9df275cb8455d9c677ae701230

https://git.kernel.org/stable/c/196a6df08b08699ace4ce70e1efcdd9081b6565f

Details

Source: Mitre, NVD

Published: 2025-12-30

Updated: 2025-12-31

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00024