First published: Fri Dec 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() ib_map_mr_sg() allows ULPs to specify NULL as the sg_offset argument. The driver needs to check whether it is a NULL pointer before dereferencing it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.10.224<5.10.231 | |
Linux Kernel | >=5.15.165<5.15.174 | |
Linux Kernel | >=6.1.103<6.1.120 | |
Linux Kernel | >=6.6.44<6.6.64 | |
Linux Kernel | >=6.10.3<6.11.11 | |
Linux Kernel | >=6.12<6.12.2 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53226 has a severity rating that indicates it is a notable vulnerability within the Linux kernel involving a NULL pointer dereference.
To address CVE-2024-53226, upgrade your Linux kernel to the latest version that resolves this vulnerability.
CVE-2024-53226 affects Linux kernel versions from 5.10.224 to 5.10.231, 5.15.165 to 5.15.174, 6.1.103 to 6.1.120, 6.6.44 to 6.6.64, 6.10.3 to 6.11.11, and 6.12 to 6.12.2.
CVE-2024-53226 can potentially be exploited due to the NULL pointer dereference, which may lead to system crashes or unauthorized access.
Users and organizations running vulnerable versions of the Linux kernel should take action to mitigate the effects of CVE-2024-53226.