### [CVE-2024-50208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=0c4dcd602817502bb3dced7a834a13ef717d65a4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pagesAvoid memory corruption while setting up Level-2 PBL pages for the non MRresources when num_pages > 256K.There will be a single PDE page address (contiguous pages in the case of >PAGE_SIZE), but, current logic assumes multiple pages, leading to invalidmemory access after 256K PBL entries in the PDE. ### POC #### Reference No PoCs from references. #### Github - https://github.com/w4zu/Debian_security