In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" This patch ensures that the RX ring size (rx_pending) is not set below the permitted length. This avoids UBSAN shift-out-of-bounds errors when users passes small or zero ring sizes via ethtool -G.
https://git.kernel.org/stable/c/b23a2e15589466a027c9baa3fb5813c9f6a6c6dc
https://git.kernel.org/stable/c/aa743b0d98448282b2cb37356db8db2a48524624
https://git.kernel.org/stable/c/85f4b0c650d9f9db10bda8d3acfa1af83bf78cf7
https://git.kernel.org/stable/c/658caf3b8aad65f8b8e102670ca4f68c7030f655
https://git.kernel.org/stable/c/442848e457f5a9f71a4e7e14d24d73dae278ebe3