VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54168

CVE-2023-54168

Description

In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()

The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size()").

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's RDMA/mlx4 driver, a user-controlled shift in set_user_sq_size() can cause undefined behavior, fixed by adding overflow checking.

Vulnerability

Overview

In the Linux kernel's RDMA/mlx4 driver, the function set_user_sq_size() does not properly validate the ucmd->log_sq_bb_count value before using it in a shift operation. Since log_sq_bb_count is controlled by the user, the shift can overflow, leading to undefined behavior. This issue mirrors a previously fixed vulnerability in the RDMA/hns driver (commit 515f60004ed9).

Exploitation

An attacker with local access and the ability to invoke the affected IOCTL can supply a crafted log_sq_bb_count value to trigger the shift wrapping. No additional privileges are required beyond the ability to interact with the RDMA subsystem, which may be accessible to unprivileged users depending on system configuration.

Impact

Successful exploitation could result in incorrect memory calculations or other undefined behavior, potentially leading to system crashes or privilege escalation. The exact impact depends on the surrounding code context, but shift wrapping can cause out-of-bounds memory access or other memory corruption issues.

Mitigation

The vulnerability was fixed in Linux kernel stable releases by using check_shl_overflow() to prevent the shift from wrapping. Users should update to kernels containing the fix, such as those including commit [1] for the RDMA/mlx4 driver.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.