{
  "threat_severity" : "Moderate",
  "public_date" : "2024-04-03T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error",
    "id" : "2273187",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2273187"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-193",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nIB/hfi1: Fix sdma.h tx->num_descs off-by-one error\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990]  <TASK>\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\ncrash> ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\ntxreq = {\nlist = {\nnext = 0xffff9cfeba229f00,\nprev = 0xffff9cfeba229f00\n},\ndescp = 0xffff9cfeba229f40,\ncoalesce_buf = 0x0,\nwait = 0xffff9cfea4e69a48,\ncomplete = 0xffffffffc0fe0760 <hfi1_ipoib_sdma_complete>,\npacket_len = 0x46d,\ntlen = 0x0,\nnum_desc = 0x0,\ndesc_limit = 0x6,\nnext_descq_idx = 0x45c,\ncoalesce_idx = 0x0,\nflags = 0x0,\ndescs = {{\nqw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n}, {\nqw = {  0x3800014231b108, 0x4}\n}, {\nqw = { 0x310000e4ee0fcf0, 0x8}\n}, {\nqw = {  0x3000012e9f8000, 0x8}\n}, {\nqw = {  0x59000dfb9d0000, 0x8}\n}, {\nqw = {  0x78000e02e40000, 0x8}\n}}\n},\nsdma_hdr =  0x400300015528b000,  <<< invalid pointer in the tx request structure\nsdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\ncomplete = 0x0,\npriv = 0x0,\ntxq = 0xffff9cfea4e69880,\nskb = 0xffff9d099809f400\n}\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\nWith this patch the crashes are no longer reproducible and the machine is\nstable.", "A vulnerability was found in the Linux kernel's infiniband hfi1 driver. This issue is caused by the incorrect handling of SDMA descriptors, which can lead to an array overflow and potential memory corruption or crashes." ],
  "statement" : "None of the products shipped by Red Hat are affected by this vulnerability.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-02T00:00:00Z",
    "advisory" : "RHSA-2026:1661",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8::nfv",
    "package" : "kernel-rt-0:4.18.0-553.100.1.rt7.441.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-02-02T00:00:00Z",
    "advisory" : "RHSA-2026:1662",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "kernel-0:4.18.0-553.100.1.el8_10"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-26766\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-26766\nhttps://lore.kernel.org/linux-cve-announce/2024040306-CVE-2024-26766-6b6a@gregkh/T" ],
  "name" : "CVE-2024-26766",
  "csaw" : false
}