scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done()
Summary
| CVE | CVE-2026-31464 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:42 UTC |
| Updated | 2026-04-22 14:16:42 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done()
A malicious or compromised VIO server can return a num_written value in the
discover targets MAD response that exceeds max_targets. This value is
stored directly in vhost->num_targets without validation, and is then used
as the loop bound in ibmvfc_alloc_targets() to index into disc_buf[], which
is only allocated for max_targets entries. Indices at or beyond max_targets
access kernel memory outside the DMA-coherent allocation. The
out-of-bounds data is subsequently embedded in Implicit Logout and PLOGI
MADs that are sent back to the VIO server, leaking kernel memory.
Fix by clamping num_written to max_targets before storing it. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 d842348f8a00d5b1d7358f207eb34ffcf5b16df3 git |
Not specified |
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 a007246cb6c9ebdc93dafbf63cc2d43d98f402cc git |
Not specified |
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 394a1cac3c12fdd7d77f19ccfd222ab5ff87ef89 git |
Not specified |
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 4ed727e35b0ab17d3eeeb1e8023768396e2be161 git |
Not specified |
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 d1466bf991b2343cf2ba8336e440c8faf3cbb780 git |
Not specified |
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 786f10b1966e485046839f992e89f2c18cbd1983 git |
Not specified |
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 bae4df0a643fa7f84663473aa3082a9c2ed139db git |
Not specified |
| CNA |
Linux |
Linux |
affected 072b91f9c6510d0ec4a49d07dbc318760c7da7b3 61d099ac4a7a8fb11ebdb6e2ec8d77f38e77362f git |
Not specified |
| CNA |
Linux |
Linux |
affected 2.6.27 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 2.6.27 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.131 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.80 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/a007246cb6c9ebdc93dafbf63cc2d43d98f402cc |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/394a1cac3c12fdd7d77f19ccfd222ab5ff87ef89 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/4ed727e35b0ab17d3eeeb1e8023768396e2be161 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d842348f8a00d5b1d7358f207eb34ffcf5b16df3 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/bae4df0a643fa7f84663473aa3082a9c2ed139db |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d1466bf991b2343cf2ba8336e440c8faf3cbb780 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/61d099ac4a7a8fb11ebdb6e2ec8d77f38e77362f |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/786f10b1966e485046839f992e89f2c18cbd1983 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.