CVE-2023-54168
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size()").
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's RDMA/mlx4 driver, a user-controlled shift in set_user_sq_size() can cause undefined behavior, fixed by adding overflow checking.
Vulnerability
Overview
In the Linux kernel's RDMA/mlx4 driver, the function set_user_sq_size() does not properly validate the ucmd->log_sq_bb_count value before using it in a shift operation. Since log_sq_bb_count is controlled by the user, the shift can overflow, leading to undefined behavior. This issue mirrors a previously fixed vulnerability in the RDMA/hns driver (commit 515f60004ed9).
Exploitation
An attacker with local access and the ability to invoke the affected IOCTL can supply a crafted log_sq_bb_count value to trigger the shift wrapping. No additional privileges are required beyond the ability to interact with the RDMA subsystem, which may be accessible to unprivileged users depending on system configuration.
Impact
Successful exploitation could result in incorrect memory calculations or other undefined behavior, potentially leading to system crashes or privilege escalation. The exact impact depends on the surrounding code context, but shift wrapping can cause out-of-bounds memory access or other memory corruption issues.
Mitigation
The vulnerability was fixed in Linux kernel stable releases by using check_shl_overflow() to prevent the shift from wrapping. Users should update to kernels containing the fix, such as those including commit [1] for the RDMA/mlx4 driver.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
83d5ae269c4bd8feca62590079ad3221c86cc9911be2155723ce0df349327196a6df08b08a183905869e6d50b3c73f1acVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/196a6df08b08699ace4ce70e1efcdd9081b6565fnvd
- git.kernel.org/stable/c/3ce0df3493277b9df275cb8455d9c677ae701230nvd
- git.kernel.org/stable/c/3d5ae269c4bd392ec1edbfb3bd031b8f42d7feffnvd
- git.kernel.org/stable/c/8feca625900777e02a449e53fe4121339934c38anvd
- git.kernel.org/stable/c/9911be2155720221a4f1f722b22bd0e2388d8bcfnvd
- git.kernel.org/stable/c/9ad3221c86cc9c6305594b742d4a72dfbd4ea579nvd
- git.kernel.org/stable/c/a183905869e692b6b7805b7472235585eff8e429nvd
- git.kernel.org/stable/c/d50b3c73f1ac20dabc53dc6e9d64ce9c79a331ebnvd
News mentions
0No linked articles in our index yet.