CVE-2023-54168 — Integer Overflow or Wraparound in Linux
Severity
6.6MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
The ucmd->log_sq_bb_count variable is controlled by the user so this
shift can wrap. Fix it by using check_shl_overflow() in the same way
that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined
behavior in hns_roce_set_user_sq_size()").
Affected Packages4 packages
▶CVEListV5linux/linux839041329fd3410e07d614f81e75bb43367d8f89 — 3d5ae269c4bd392ec1edbfb3bd031b8f42d7feff+8
🔴Vulnerability Details
3GHSA▶
GHSA-54vr-v43g-gq47: In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
The ucmd->log_sq_bb_coun↗2025-12-30
OSV▶
CVE-2023-54168: In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count↗2025-12-30