### [CVE-2024-53226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53226) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=3c301b8a046b57e3de14c6fc669d81dcb71bb5b5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4d480e45cb7fffb9d9b49924469c1f458068080a%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5a13652ac34be9b60feec89835763574825a8905%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.11%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=d387d4b54eb84208bd4ca13572e106851d0a0819%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ecdf900a5a3372bc0208e0701a116f112eb6039c%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=edc2dee07ab4ae2188b9780c453a64032162a5a0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()ib_map_mr_sg() allows ULPs to specify NULL as the sg_offset argument.The driver needs to check whether it is a NULL pointer beforedereferencing it. ### POC #### Reference No PoCs from references. #### Github - https://github.com/cku-heise/euvd-api-doc - https://github.com/w4zu/Debian_security