CVE-2024-53226

In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() ib_map_mr_sg() allows ULPs to specify NULL as the sg_offset argument. The driver needs to check whether it is a NULL pointer before dereferencing it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Jan 2025, 16:40

Type Values Removed Values Added
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se corrige la desreferenciación de puntero NULL en hns_roce_map_mr_sg() ib_map_mr_sg() permite que los ULP especifiquen NULL como argumento sg_offset. El controlador debe verificar si es un puntero NULL antes de desreferenciarlo.
References () https://git.kernel.org/stable/c/35f5b68f63aac61d30ce0b0c6beb09b8845a3e65 - () https://git.kernel.org/stable/c/35f5b68f63aac61d30ce0b0c6beb09b8845a3e65 - Patch
References () https://git.kernel.org/stable/c/52617e76f4963644db71dc0a17e998654dc0c7f4 - () https://git.kernel.org/stable/c/52617e76f4963644db71dc0a17e998654dc0c7f4 - Patch
References () https://git.kernel.org/stable/c/6b0d7d6e6883d0ec70cd7b5a02c47c003d5defe7 - () https://git.kernel.org/stable/c/6b0d7d6e6883d0ec70cd7b5a02c47c003d5defe7 - Patch
References () https://git.kernel.org/stable/c/6b526d17eed850352d880b93b9bf20b93006bd92 - () https://git.kernel.org/stable/c/6b526d17eed850352d880b93b9bf20b93006bd92 - Patch
References () https://git.kernel.org/stable/c/71becb0e9df78a8d43dfd0efcef18c830a0af477 - () https://git.kernel.org/stable/c/71becb0e9df78a8d43dfd0efcef18c830a0af477 - Patch
References () https://git.kernel.org/stable/c/8c269bb2cc666ca580271e1a8136c63ac9162e1e - () https://git.kernel.org/stable/c/8c269bb2cc666ca580271e1a8136c63ac9162e1e - Patch
References () https://git.kernel.org/stable/c/bd715e191d444992d6ed124f15856da5c1cae2de - () https://git.kernel.org/stable/c/bd715e191d444992d6ed124f15856da5c1cae2de - Patch

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-01-08 16:40


NVD link : CVE-2024-53226

Mitre link : CVE-2024-53226

CVE.ORG link : CVE-2024-53226


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference