<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T11:25:00.776160+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3381bd5e-f089-44ce-87a7-1ba6b9254755/export</id>
    <title>3381bd5e-f089-44ce-87a7-1ba6b9254755</title>
    <updated>2026-05-09T11:25:01.144471+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3381bd5e-f089-44ce-87a7-1ba6b9254755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36916", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16989", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36916\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nblk-iocost: avoid out of bounds shift\n\nUBSAN catches undefined behavior in blk-iocost, where sometimes\niocg-&amp;gt;delay is shifted right by a number that is too large,\nresulting in undefined behavior on some architectures.\n\n[  186.556576] ------------[ cut here ]------------\nUBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23\nshift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')\nCPU: 16 PID: 0 Comm: swapper/16 Tainted: G S          E    N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1\nHardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020\nCall Trace:\n \n dump_stack_lvl+0x8f/0xe0\n __ubsan_handle_shift_out_of_bounds+0x22c/0x280\n iocg_kick_delay+0x30b/0x310\n ioc_timer_fn+0x2fb/0x1f80\n __run_timer_base+0x1b6/0x250\n...\n\nAvoid that undefined behavior by simply taking the\n\"delay = 0\" branch if the shift is too large.\n\nI am not sure what the symptoms of an undefined value\ndelay will be, but I suspect it could be more than a\nlittle annoying to debug.\n\ud83d\udccf Published: 2024-05-30T15:29:12.745Z\n\ud83d\udccf Modified: 2025-05-20T14:27:33.761Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5\n2. https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1\n3. https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca\n4. https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86\n5. https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b\n6. https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d", "creation_timestamp": "2025-05-20T14:40:54.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3381bd5e-f089-44ce-87a7-1ba6b9254755/export"/>
    <published>2025-05-20T14:40:54+00:00</published>
  </entry>
</feed>
