In the Linux kernel, the following vulnerability has been resolved: blk-throttle: prevent overflow while calculating wait time There is a problem found by code review in tg_with_in_bps_limit() that 'bps_limit * jiffy_elapsed_rnd' might overflow. Fix the problem by calling mul_u64_u64_div_u64() instead.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025102209-CVE-2022-50580-68e3@gregkh/T