{"id":"CVE-2024-50208","summary":"RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages\n\nAvoid memory corruption while setting up Level-2 PBL pages for the non MR\nresources when num_pages \u003e 256K.\n\nThere will be a single PDE page address (contiguous pages in the case of \u003e\nPAGE_SIZE), but, current logic assumes multiple pages, leading to invalid\nmemory access after 256K PBL entries in the PDE.","modified":"2026-03-20T12:38:15.068385Z","published":"2024-11-08T06:07:58.607Z","related":["ALSA-2025:0059","MGASA-2024-0368","MGASA-2024-0369","SUSE-SU-2024:4131-1","SUSE-SU-2024:4313-1","SUSE-SU-2024:4314-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4317-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4345-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2024:4388-1","SUSE-SU-2025:02388-1","SUSE-SU-2025:02389-1","SUSE-SU-2025:02390-1","SUSE-SU-2025:02398-1","SUSE-SU-2025:02400-1","SUSE-SU-2025:02403-1","SUSE-SU-2025:02411-1","SUSE-SU-2025:02416-1","SUSE-SU-2025:02419-1","SUSE-SU-2025:02420-1","SUSE-SU-2025:02428-1","SUSE-SU-2025:02434-1","SUSE-SU-2025:02436-1","SUSE-SU-2025:02440-1","SUSE-SU-2025:02446-1","SUSE-SU-2025:02449-1","SUSE-SU-2025:02455-1","SUSE-SU-2025:02459-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1","SUSE-SU-2025:20517-1","SUSE-SU-2025:20518-1","SUSE-SU-2025:20525-1","SUSE-SU-2025:20526-1","SUSE-SU-2025:20540-1","SUSE-SU-2025:20544-1","USN-7276-1","USN-7277-1","openSUSE-SU-2024:14500-1","openSUSE-SU-2025:14705-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50208.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/7988bdbbb85ac85a847baf09879edcd0f70521dc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/87cb3b0054e53e0155b630bdf8fb714ded62565f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/daac56dd98e1ba814c878ac0acd482a37f2ab94b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de5857fa7bcc9a496a914c7e21390be873109f26"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df6fed0a2a1a5e57f033bca40dc316b18e0d0ce6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea701c1849e7250ea41a4f7493e0a5f136c1d47e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50208.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-50208"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0c4dcd602817502bb3dced7a834a13ef717d65a4"},{"fixed":"df6fed0a2a1a5e57f033bca40dc316b18e0d0ce6"},{"fixed":"de5857fa7bcc9a496a914c7e21390be873109f26"},{"fixed":"ea701c1849e7250ea41a4f7493e0a5f136c1d47e"},{"fixed":"87cb3b0054e53e0155b630bdf8fb714ded62565f"},{"fixed":"daac56dd98e1ba814c878ac0acd482a37f2ab94b"},{"fixed":"7988bdbbb85ac85a847baf09879edcd0f70521dc"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50208.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}