{"uuid": "27994e53-2067-4f1f-be51-8d0633b38c68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57936", "type": "seen", "source": "https://t.me/cvedetector/15925", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57936 - NetXtreme RDMA Linux Kernel Buffer Overflowulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-57936 \nPublished : Jan. 21, 2025, 12:15 p.m. | 21\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nRDMA/bnxt_re: Fix max SGEs for the Work Request  \n  \nGen P7 supports up to 13 SGEs for now. WQE software structure  \ncan hold only 6 now. Since the max send sge is reported as  \n13, the stack can give requests up to 13 SGEs. This is causing  \ntraffic failures and system crashes.  \n  \nUse the define for max SGE supported for variable size. This  \nwill work for both static and variable WQEs. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-21T13:36:53.000000Z"}