In the Linux kernel, the following vulnerability has been resolved: bpf: Check bloom filter map value size This patch adds a missing check to bloom filter creating, rejecting values above KMALLOC_MAX_SIZE. This brings the bloom map in line with many other map types. The lack of this protection can cause kernel crashes for value sizes that overflow int’s. Such a crash was caught by syzkaller. The next patch adds more guard-rails at a lower level.
git.kernel.org/linus/a8d89feba7e54e691ca7c4efc2a6264fa83f3687
git.kernel.org/stable/c/608e13706c8b6c658a0646f09ebced74ec367f7c
git.kernel.org/stable/c/a8d89feba7e54e691ca7c4efc2a6264fa83f3687
git.kernel.org/stable/c/c418afb9bf23e2f2b76cb819601e4a5d9dbab42d
git.kernel.org/stable/c/fa6995eeb62e74b5a1480c73fb7b420c270784d3
ubuntu.com/security/CVE-2024-36918
www.cve.org/CVERecord?id=CVE-2024-36918