CVE-2024-26766 (GCVE-0-2024-26766)

Vulnerability from cvelistv5 – Published: 2024-04-03 17:00 – Updated: 2025-05-04 12:54
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error Unfortunately the commit `fd8958efe877` introduced another error causing the `descs` array to overflow. This reults in further crashes easily reproducible by `sendmsg` system call. [ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [ 1080.974535] Call Trace: [ 1080.976990] <TASK> [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] hfi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash> ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfeba229f00, prev = 0xffff9cfeba229f00 }, descp = 0xffff9cfeba229f40, coalesce_buf = 0x0, wait = 0xffff9cfea4e69a48, complete = 0xffffffffc0fe0760 <hfi1_ipoib_sdma_complete>, packet_len = 0x46d, tlen = 0x0, num_desc = 0x0, desc_limit = 0x6, next_descq_idx = 0x45c, coalesce_idx = 0x0, flags = 0x0, descs = {{ qw = {0x8024000120dffb00, 0x4} # SDMA_DESC0_FIRST_DESC_FLAG (bit 63) }, { qw = { 0x3800014231b108, 0x4} }, { qw = { 0x310000e4ee0fcf0, 0x8} }, { qw = { 0x3000012e9f8000, 0x8} }, { qw = { 0x59000dfb9d0000, 0x8} }, { qw = { 0x78000e02e40000, 0x8} }} }, sdma_hdr = 0x400300015528b000, <<< invalid pointer in the tx request structure sdma_status = 0x0, SDMA_DESC0_LAST_DESC_FLAG (bit 62) complete = 0x0, priv = 0x0, txq = 0xffff9cfea4e69880, skb = 0xffff9d099809f400 } If an SDMA send consists of exactly 6 descriptors and requires dword padding (in the 7th descriptor), the sdma_txreq descriptor array is not properly expanded and the packet will overflow into the container structure. This results in a panic when the send completion runs. The exact panic varies depending on what elements of the container structure get corrupted. The fix is to use the correct expression in _pad_sdma_tx_descs() to test the need to expand the descriptor array. With this patch the crashes are no longer reproducible and the machine is stable.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: d1c1ee052d25ca23735eea912f843bc7834781b4 , < 115b7f3bc1dce590a6851a2dcf23dc1100c49790 (git)
Affected: 40ac5cb6cbb01afa40881f78b4d2f559fb7065c4 , < 5833024a9856f454a964a198c63a57e59e07baf5 (git)
Affected: 6cf8f3d690bb5ad31ef0f41a6206ecf5a068d179 , < 3f38d22e645e2e994979426ea5a35186102ff3c2 (git)
Affected: bd57756a7e43c7127d0eca1fc5868e705fd0f7ba , < 47ae64df23ed1318e27bd9844e135a5e1c0e6e39 (git)
Affected: eeaf35f4e3b360162081de5e744cf32d6d1b0091 , < 52dc9a7a573dbf778625a0efca0fca55489f084b (git)
Affected: fd8958efe8779d3db19c9124fce593ce681ac709 , < a2fef1d81becf4ff60e1a249477464eae3c3bc2a (git)
Affected: fd8958efe8779d3db19c9124fce593ce681ac709 , < 9034a1bec35e9f725315a3bb6002ef39666114d9 (git)
Affected: fd8958efe8779d3db19c9124fce593ce681ac709 , < e6f57c6881916df39db7d95981a8ad2b9c3458d6 (git)
Affected: 0ef9594936d1f078e8599a1cf683b052df2bec00 (git)
Create a notification for this product.
    Linux Linux Affected: 6.3
Unaffected: 0 , < 6.3 (semver)
Unaffected: 4.19.308 , ≤ 4.19.* (semver)
Unaffected: 5.4.270 , ≤ 5.4.* (semver)
Unaffected: 5.10.211 , ≤ 5.10.* (semver)
Unaffected: 5.15.150 , ≤ 5.15.* (semver)
Unaffected: 6.1.80 , ≤ 6.1.* (semver)
Unaffected: 6.6.19 , ≤ 6.6.* (semver)
Unaffected: 6.7.7 , ≤ 6.7.* (semver)
Unaffected: 6.8 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26766",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-03T18:11:09.801717Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:48:44.178Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:14:13.309Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/infiniband/hw/hfi1/sdma.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "115b7f3bc1dce590a6851a2dcf23dc1100c49790",
              "status": "affected",
              "version": "d1c1ee052d25ca23735eea912f843bc7834781b4",
              "versionType": "git"
            },
            {
              "lessThan": "5833024a9856f454a964a198c63a57e59e07baf5",
              "status": "affected",
              "version": "40ac5cb6cbb01afa40881f78b4d2f559fb7065c4",
              "versionType": "git"
            },
            {
              "lessThan": "3f38d22e645e2e994979426ea5a35186102ff3c2",
              "status": "affected",
              "version": "6cf8f3d690bb5ad31ef0f41a6206ecf5a068d179",
              "versionType": "git"
            },
            {
              "lessThan": "47ae64df23ed1318e27bd9844e135a5e1c0e6e39",
              "status": "affected",
              "version": "bd57756a7e43c7127d0eca1fc5868e705fd0f7ba",
              "versionType": "git"
            },
            {
              "lessThan": "52dc9a7a573dbf778625a0efca0fca55489f084b",
              "status": "affected",
              "version": "eeaf35f4e3b360162081de5e744cf32d6d1b0091",
              "versionType": "git"
            },
            {
              "lessThan": "a2fef1d81becf4ff60e1a249477464eae3c3bc2a",
              "status": "affected",
              "version": "fd8958efe8779d3db19c9124fce593ce681ac709",
              "versionType": "git"
            },
            {
              "lessThan": "9034a1bec35e9f725315a3bb6002ef39666114d9",
              "status": "affected",
              "version": "fd8958efe8779d3db19c9124fce593ce681ac709",
              "versionType": "git"
            },
            {
              "lessThan": "e6f57c6881916df39db7d95981a8ad2b9c3458d6",
              "status": "affected",
              "version": "fd8958efe8779d3db19c9124fce593ce681ac709",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "0ef9594936d1f078e8599a1cf683b052df2bec00",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/infiniband/hw/hfi1/sdma.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.3"
            },
            {
              "lessThan": "6.3",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.308",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.270",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.211",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.150",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.80",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.19",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.7.*",
              "status": "unaffected",
              "version": "6.7.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.8",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.308",
                  "versionStartIncluding": "4.19.291",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.270",
                  "versionStartIncluding": "5.4.251",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.211",
                  "versionStartIncluding": "5.10.188",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.150",
                  "versionStartIncluding": "5.15.99",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.80",
                  "versionStartIncluding": "6.1.16",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.19",
                  "versionStartIncluding": "6.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.7.7",
                  "versionStartIncluding": "6.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.8",
                  "versionStartIncluding": "6.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.2.3",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\n\nUnfortunately the commit `fd8958efe877` introduced another error\ncausing the `descs` array to overflow. This reults in further crashes\neasily reproducible by `sendmsg` system call.\n\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\n--\n[ 1080.974535] Call Trace:\n[ 1080.976990]  \u003cTASK\u003e\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\n--\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\n\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\nstruct ipoib_txreq {\n  txreq = {\n    list = {\n      next = 0xffff9cfeba229f00,\n      prev = 0xffff9cfeba229f00\n    },\n    descp = 0xffff9cfeba229f40,\n    coalesce_buf = 0x0,\n    wait = 0xffff9cfea4e69a48,\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\n    packet_len = 0x46d,\n    tlen = 0x0,\n    num_desc = 0x0,\n    desc_limit = 0x6,\n    next_descq_idx = 0x45c,\n    coalesce_idx = 0x0,\n    flags = 0x0,\n    descs = {{\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\n      }, {\n        qw = {  0x3800014231b108, 0x4}\n      }, {\n        qw = { 0x310000e4ee0fcf0, 0x8}\n      }, {\n        qw = {  0x3000012e9f8000, 0x8}\n      }, {\n        qw = {  0x59000dfb9d0000, 0x8}\n      }, {\n        qw = {  0x78000e02e40000, 0x8}\n      }}\n  },\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\n  complete = 0x0,\n  priv = 0x0,\n  txq = 0xffff9cfea4e69880,\n  skb = 0xffff9d099809f400\n}\n\nIf an SDMA send consists of exactly 6 descriptors and requires dword\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\nproperly expanded and the packet will overflow into the container\nstructure. This results in a panic when the send completion runs. The\nexact panic varies depending on what elements of the container structure\nget corrupted. The fix is to use the correct expression in\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\n\nWith this patch the crashes are no longer reproducible and the machine is\nstable."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:54:42.053Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790"
        },
        {
          "url": "https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5"
        },
        {
          "url": "https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2"
        },
        {
          "url": "https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39"
        },
        {
          "url": "https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b"
        },
        {
          "url": "https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a"
        },
        {
          "url": "https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9"
        },
        {
          "url": "https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6"
        }
      ],
      "title": "IB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-26766",
    "datePublished": "2024-04-03T17:00:48.642Z",
    "dateReserved": "2024-02-19T14:20:24.173Z",
    "dateUpdated": "2025-05-04T12:54:42.053Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\\n\\nUnfortunately the commit `fd8958efe877` introduced another error\\ncausing the `descs` array to overflow. This reults in further crashes\\neasily reproducible by `sendmsg` system call.\\n\\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\\n--\\n[ 1080.974535] Call Trace:\\n[ 1080.976990]  \u003cTASK\u003e\\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\\n--\\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\\n\\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\\nstruct ipoib_txreq {\\n  txreq = {\\n    list = {\\n      next = 0xffff9cfeba229f00,\\n      prev = 0xffff9cfeba229f00\\n    },\\n    descp = 0xffff9cfeba229f40,\\n    coalesce_buf = 0x0,\\n    wait = 0xffff9cfea4e69a48,\\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\\n    packet_len = 0x46d,\\n    tlen = 0x0,\\n    num_desc = 0x0,\\n    desc_limit = 0x6,\\n    next_descq_idx = 0x45c,\\n    coalesce_idx = 0x0,\\n    flags = 0x0,\\n    descs = {{\\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\\n      }, {\\n        qw = {  0x3800014231b108, 0x4}\\n      }, {\\n        qw = { 0x310000e4ee0fcf0, 0x8}\\n      }, {\\n        qw = {  0x3000012e9f8000, 0x8}\\n      }, {\\n        qw = {  0x59000dfb9d0000, 0x8}\\n      }, {\\n        qw = {  0x78000e02e40000, 0x8}\\n      }}\\n  },\\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\\n  complete = 0x0,\\n  priv = 0x0,\\n  txq = 0xffff9cfea4e69880,\\n  skb = 0xffff9d099809f400\\n}\\n\\nIf an SDMA send consists of exactly 6 descriptors and requires dword\\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\\nproperly expanded and the packet will overflow into the container\\nstructure. This results in a panic when the send completion runs. The\\nexact panic varies depending on what elements of the container structure\\nget corrupted. The fix is to use the correct expression in\\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\\n\\nWith this patch the crashes are no longer reproducible and the machine is\\nstable.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: IB/hfi1: Corrija el error sdma.h tx-\u0026gt;num_descs off-by-one Desafortunadamente, el commit `fd8958efe877` introdujo otro error que provoc\\u00f3 que la matriz `descs` se desbordara. Esto da como resultado m\\u00e1s fallas f\\u00e1cilmente reproducibles mediante la llamada al SYSTEM \\\"sendmsg\\\". [ 1080.836473] falla de protecci\\u00f3n general, probablemente para direcci\\u00f3n no can\\u00f3nica 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [1080.974535] Seguimiento de llamadas: [ 1080.976990]  [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] h fi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash\u0026gt; ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfe ba229f00, anterior = 0xffff9cfeba229f00}, descp = 0xffff9cfeba229f40, coalesce_buf = 0x0, espera = 0xffff9cfea4e69a48, completo = 0xffffffffc0fe0760 , paquete_len = 0x46d, tlen = 0x0, num_desc = 0x0, desc_limit = 0x6, next_descq_idx = 0x45c, coalesce_idx = 0x0, banderas = 0x0 , descs = {{ qw = {0x8024000120dffb00, 0x4} # SDMA_DESC0_FIRST_DESC_FLAG (bit 63) }, { qw = { 0x3800014231b108, 0x4} }, { qw = { 0x310000e4ee0fcf0, 0x8} }, { qw = { 0x3000012e9f8000, 0x8} }, { qw = { 0x59000dfb9d0000, 0x8} }, { qw = { 0x78000e02e40000, 0x8} }} }, sdma_hdr = 0x400300015528b000, \u0026lt;\u0026lt;\u0026lt; puntero no v\\u00e1lido en la estructura de solicitud de tx sdma_status = 0x0, SDMA_DESC0_LAST_DESC_FLAG (bit 62) completo = 0x0, priv = 0x0, txq = 0xffff9cfea4e69880, skb = 0xffff9d099809f400 } Si es un SDMA send consta de exactamente 6 descriptores y requiere relleno de dword (en el s\\u00e9ptimo descriptor), la matriz de descriptores sdma_txreq no se expande adecuadamente y el paquete se desbordar\\u00e1 hacia la estructura del contenedor. Esto produce p\\u00e1nico cuando se ejecuta la finalizaci\\u00f3n del env\\u00edo. El p\\u00e1nico exacto var\\u00eda dependiendo de qu\\u00e9 elementos de la estructura del contenedor se corrompen. La soluci\\u00f3n es utilizar la expresi\\u00f3n correcta en _pad_sdma_tx_descs() para probar la necesidad de expandir la matriz de descriptores. Con este parche los fallos ya no son reproducibles y la m\\u00e1quina est\\u00e1 estable.\"}]",
      "id": "CVE-2024-26766",
      "lastModified": "2024-11-21T09:03:01.327",
      "published": "2024-04-03T17:15:52.683",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-26766\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-03T17:15:52.683\",\"lastModified\":\"2025-02-27T22:00:45.430\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\\n\\nUnfortunately the commit `fd8958efe877` introduced another error\\ncausing the `descs` array to overflow. This reults in further crashes\\neasily reproducible by `sendmsg` system call.\\n\\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\\n--\\n[ 1080.974535] Call Trace:\\n[ 1080.976990]  \u003cTASK\u003e\\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\\n--\\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\\n\\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\\nstruct ipoib_txreq {\\n  txreq = {\\n    list = {\\n      next = 0xffff9cfeba229f00,\\n      prev = 0xffff9cfeba229f00\\n    },\\n    descp = 0xffff9cfeba229f40,\\n    coalesce_buf = 0x0,\\n    wait = 0xffff9cfea4e69a48,\\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\\n    packet_len = 0x46d,\\n    tlen = 0x0,\\n    num_desc = 0x0,\\n    desc_limit = 0x6,\\n    next_descq_idx = 0x45c,\\n    coalesce_idx = 0x0,\\n    flags = 0x0,\\n    descs = {{\\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\\n      }, {\\n        qw = {  0x3800014231b108, 0x4}\\n      }, {\\n        qw = { 0x310000e4ee0fcf0, 0x8}\\n      }, {\\n        qw = {  0x3000012e9f8000, 0x8}\\n      }, {\\n        qw = {  0x59000dfb9d0000, 0x8}\\n      }, {\\n        qw = {  0x78000e02e40000, 0x8}\\n      }}\\n  },\\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\\n  complete = 0x0,\\n  priv = 0x0,\\n  txq = 0xffff9cfea4e69880,\\n  skb = 0xffff9d099809f400\\n}\\n\\nIf an SDMA send consists of exactly 6 descriptors and requires dword\\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\\nproperly expanded and the packet will overflow into the container\\nstructure. This results in a panic when the send completion runs. The\\nexact panic varies depending on what elements of the container structure\\nget corrupted. The fix is to use the correct expression in\\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\\n\\nWith this patch the crashes are no longer reproducible and the machine is\\nstable.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: IB/hfi1: Corrija el error sdma.h tx-\u0026gt;num_descs off-by-one Desafortunadamente, el commit `fd8958efe877` introdujo otro error que provoc\u00f3 que la matriz `descs` se desbordara. Esto da como resultado m\u00e1s fallas f\u00e1cilmente reproducibles mediante la llamada al SYSTEM \\\"sendmsg\\\". [ 1080.836473] falla de protecci\u00f3n general, probablemente para direcci\u00f3n no can\u00f3nica 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI [ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1] -- [1080.974535] Seguimiento de llamadas: [ 1080.976990]  [ 1081.021929] hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1] [ 1081.027364] hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1] [ 1081.032633] h fi1_ipoib_send+0x112/0x300 [hfi1] [ 1081.042001] ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib] [ 1081.046978] dev_hard_start_xmit+0xc4/0x210 -- [ 1081.148347] __sys_sendmsg+0x59/0xa0 crash\u0026gt; ipoib_txreq 0xffff9cfeba229f00 struct ipoib_txreq { txreq = { list = { next = 0xffff9cfe ba229f00, anterior = 0xffff9cfeba229f00}, descp = 0xffff9cfeba229f40, coalesce_buf = 0x0, espera = 0xffff9cfea4e69a48, completo = 0xffffffffc0fe0760 , paquete_len = 0x46d, tlen = 0x0, num_desc = 0x0, desc_limit = 0x6, next_descq_idx = 0x45c, coalesce_idx = 0x0, banderas = 0x0 , descs = {{ qw = {0x8024000120dffb00, 0x4} # SDMA_DESC0_FIRST_DESC_FLAG (bit 63) }, { qw = { 0x3800014231b108, 0x4} }, { qw = { 0x310000e4ee0fcf0, 0x8} }, { qw = { 0x3000012e9f8000, 0x8} }, { qw = { 0x59000dfb9d0000, 0x8} }, { qw = { 0x78000e02e40000, 0x8} }} }, sdma_hdr = 0x400300015528b000, \u0026lt;\u0026lt;\u0026lt; puntero no v\u00e1lido en la estructura de solicitud de tx sdma_status = 0x0, SDMA_DESC0_LAST_DESC_FLAG (bit 62) completo = 0x0, priv = 0x0, txq = 0xffff9cfea4e69880, skb = 0xffff9d099809f400 } Si es un SDMA send consta de exactamente 6 descriptores y requiere relleno de dword (en el s\u00e9ptimo descriptor), la matriz de descriptores sdma_txreq no se expande adecuadamente y el paquete se desbordar\u00e1 hacia la estructura del contenedor. Esto produce p\u00e1nico cuando se ejecuta la finalizaci\u00f3n del env\u00edo. El p\u00e1nico exacto var\u00eda dependiendo de qu\u00e9 elementos de la estructura del contenedor se corrompen. La soluci\u00f3n es utilizar la expresi\u00f3n correcta en _pad_sdma_tx_descs() para probar la necesidad de expandir la matriz de descriptores. Con este parche los fallos ya no son reproducibles y la m\u00e1quina est\u00e1 estable.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-193\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19.291\",\"versionEndExcluding\":\"4.19.308\",\"matchCriteriaId\":\"753EDC06-9ECC-4381-96AF-D76C2CE3AA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.251\",\"versionEndExcluding\":\"5.4.270\",\"matchCriteriaId\":\"3E2E173D-B660-495B-9BD7-3288E67DC90C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.10.188\",\"versionEndExcluding\":\"5.10.211\",\"matchCriteriaId\":\"2EEBC237-6F23-441B-A50F-30EC78CCBF30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.99\",\"versionEndExcluding\":\"5.15.150\",\"matchCriteriaId\":\"C044959E-2DE0-4D23-815C-524EB57D43BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.16\",\"versionEndExcluding\":\"6.1.80\",\"matchCriteriaId\":\"7E7C6BD8-B445-4666-A3C1-366FC4E567D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2.3\",\"versionEndExcluding\":\"6.6.19\",\"matchCriteriaId\":\"039BFF3A-50B9-4C28-8B00-F26B1968B592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.7.7\",\"matchCriteriaId\":\"575EE16B-67F2-4B5B-B5F8-1877715C898B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F4EA73-0894-400F-A490-3A397AB7A517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"056BD938-0A27-4569-B391-30578B309EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02056A5-B362-4370-9FF8-6F0BD384D520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"62075ACE-B2A0-4B16-829D-B3DA5AE5CC41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A780F817-2A77-4130-A9B7-5C25606314E3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:14:13.309Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-26766\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-03T18:11:09.801717Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:21.768Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"IB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"d1c1ee052d25ca23735eea912f843bc7834781b4\", \"lessThan\": \"115b7f3bc1dce590a6851a2dcf23dc1100c49790\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"40ac5cb6cbb01afa40881f78b4d2f559fb7065c4\", \"lessThan\": \"5833024a9856f454a964a198c63a57e59e07baf5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"6cf8f3d690bb5ad31ef0f41a6206ecf5a068d179\", \"lessThan\": \"3f38d22e645e2e994979426ea5a35186102ff3c2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"bd57756a7e43c7127d0eca1fc5868e705fd0f7ba\", \"lessThan\": \"47ae64df23ed1318e27bd9844e135a5e1c0e6e39\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"eeaf35f4e3b360162081de5e744cf32d6d1b0091\", \"lessThan\": \"52dc9a7a573dbf778625a0efca0fca55489f084b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd8958efe8779d3db19c9124fce593ce681ac709\", \"lessThan\": \"a2fef1d81becf4ff60e1a249477464eae3c3bc2a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd8958efe8779d3db19c9124fce593ce681ac709\", \"lessThan\": \"9034a1bec35e9f725315a3bb6002ef39666114d9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"fd8958efe8779d3db19c9124fce593ce681ac709\", \"lessThan\": \"e6f57c6881916df39db7d95981a8ad2b9c3458d6\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/infiniband/hw/hfi1/sdma.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.3\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.308\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.270\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.211\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.150\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.80\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.19\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.7.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.7.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/infiniband/hw/hfi1/sdma.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790\"}, {\"url\": \"https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5\"}, {\"url\": \"https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2\"}, {\"url\": \"https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39\"}, {\"url\": \"https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b\"}, {\"url\": \"https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a\"}, {\"url\": \"https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9\"}, {\"url\": \"https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nIB/hfi1: Fix sdma.h tx-\u003enum_descs off-by-one error\\n\\nUnfortunately the commit `fd8958efe877` introduced another error\\ncausing the `descs` array to overflow. This reults in further crashes\\neasily reproducible by `sendmsg` system call.\\n\\n[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI\\n[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]\\n--\\n[ 1080.974535] Call Trace:\\n[ 1080.976990]  \u003cTASK\u003e\\n[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]\\n[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]\\n[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]\\n[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]\\n[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210\\n--\\n[ 1081.148347]  __sys_sendmsg+0x59/0xa0\\n\\ncrash\u003e ipoib_txreq 0xffff9cfeba229f00\\nstruct ipoib_txreq {\\n  txreq = {\\n    list = {\\n      next = 0xffff9cfeba229f00,\\n      prev = 0xffff9cfeba229f00\\n    },\\n    descp = 0xffff9cfeba229f40,\\n    coalesce_buf = 0x0,\\n    wait = 0xffff9cfea4e69a48,\\n    complete = 0xffffffffc0fe0760 \u003chfi1_ipoib_sdma_complete\u003e,\\n    packet_len = 0x46d,\\n    tlen = 0x0,\\n    num_desc = 0x0,\\n    desc_limit = 0x6,\\n    next_descq_idx = 0x45c,\\n    coalesce_idx = 0x0,\\n    flags = 0x0,\\n    descs = {{\\n        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)\\n      }, {\\n        qw = {  0x3800014231b108, 0x4}\\n      }, {\\n        qw = { 0x310000e4ee0fcf0, 0x8}\\n      }, {\\n        qw = {  0x3000012e9f8000, 0x8}\\n      }, {\\n        qw = {  0x59000dfb9d0000, 0x8}\\n      }, {\\n        qw = {  0x78000e02e40000, 0x8}\\n      }}\\n  },\\n  sdma_hdr =  0x400300015528b000,  \u003c\u003c\u003c invalid pointer in the tx request structure\\n  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)\\n  complete = 0x0,\\n  priv = 0x0,\\n  txq = 0xffff9cfea4e69880,\\n  skb = 0xffff9d099809f400\\n}\\n\\nIf an SDMA send consists of exactly 6 descriptors and requires dword\\npadding (in the 7th descriptor), the sdma_txreq descriptor array is not\\nproperly expanded and the packet will overflow into the container\\nstructure. This results in a panic when the send completion runs. The\\nexact panic varies depending on what elements of the container structure\\nget corrupted. The fix is to use the correct expression in\\n_pad_sdma_tx_descs() to test the need to expand the descriptor array.\\n\\nWith this patch the crashes are no longer reproducible and the machine is\\nstable.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.308\", \"versionStartIncluding\": \"4.19.291\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.270\", \"versionStartIncluding\": \"5.4.251\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.211\", \"versionStartIncluding\": \"5.10.188\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.150\", \"versionStartIncluding\": \"5.15.99\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.80\", \"versionStartIncluding\": \"6.1.16\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.19\", \"versionStartIncluding\": \"6.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.7.7\", \"versionStartIncluding\": \"6.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.8\", \"versionStartIncluding\": \"6.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.2.3\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T08:56:01.450Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-26766\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T08:56:01.450Z\", \"dateReserved\": \"2024-02-19T14:20:24.173Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-04-03T17:00:48.642Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…