Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Harden depth calculation functions An issue was exposed where OS can pass in U32_MAX for SQ/RQ/SRQ size. This can cause integer overflow and truncation of SQ/RQ/SRQ depth returning a success when it should have failed. Harden the functions to do all depth calculations and boundary checking in u64 sizes.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.18.1, < 6.18.21 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/3f08351de5ca4f2f724b86ad252fbc21289467e1Patch
- https://git.kernel.org/stable/c/cbd852f5700eb3f64392452faf693ac45cae8281Patch
- https://git.kernel.org/stable/c/e37afcb56ae070477741fe2d6e61fc0c542cce2dPatch
FAQ
What is CVE-2026-31491?
CVE-2026-31491 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Harden depth calculation functions An issue was exposed where OS can pass in U32_MAX for SQ/RQ/SRQ size. This can caus...
How severe is CVE-2026-31491?
CVE-2026-31491 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31491?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.