In the Linux kernel, the following vulnerability has been resolved: bpf:
Check bloom filter map value size This patch adds a missing check to bloom
filter creating, rejecting values above KMALLOC_MAX_SIZE. This brings the
bloom map in line with many other map types. The lack of this protection
can cause kernel crashes for value sizes that overflow int’s. Such a crash
was caught by syzkaller. The next patch adds more guard-rails at a lower
level.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/a8d89feba7e54e691ca7c4efc2a6264fa83f3687 (6.9-rc2)
git.kernel.org/stable/c/608e13706c8b6c658a0646f09ebced74ec367f7c
git.kernel.org/stable/c/a8d89feba7e54e691ca7c4efc2a6264fa83f3687
git.kernel.org/stable/c/c418afb9bf23e2f2b76cb819601e4a5d9dbab42d
git.kernel.org/stable/c/fa6995eeb62e74b5a1480c73fb7b420c270784d3
launchpad.net/bugs/cve/CVE-2024-36918
nvd.nist.gov/vuln/detail/CVE-2024-36918
security-tracker.debian.org/tracker/CVE-2024-36918
www.cve.org/CVERecord?id=CVE-2024-36918