RDMA/irdma: Harden depth calculation functions
Summary
| CVE | CVE-2026-31491 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:46 UTC |
| Updated | 2026-04-22 14:16:46 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Harden depth calculation functions
An issue was exposed where OS can pass in U32_MAX for SQ/RQ/SRQ size.
This can cause integer overflow and truncation of SQ/RQ/SRQ depth
returning a success when it should have failed.
Harden the functions to do all depth calculations and boundary
checking in u64 sizes. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 563e1feb5f6ed579acb55850f1bbb831aecf645a 3f08351de5ca4f2f724b86ad252fbc21289467e1 git |
Not specified |
| CNA |
Linux |
Linux |
affected 563e1feb5f6ed579acb55850f1bbb831aecf645a cbd852f5700eb3f64392452faf693ac45cae8281 git |
Not specified |
| CNA |
Linux |
Linux |
affected 563e1feb5f6ed579acb55850f1bbb831aecf645a e37afcb56ae070477741fe2d6e61fc0c542cce2d git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.18 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/cbd852f5700eb3f64392452faf693ac45cae8281 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/e37afcb56ae070477741fe2d6e61fc0c542cce2d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/3f08351de5ca4f2f724b86ad252fbc21289467e1 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.