<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 07:31:27 +0000</lastBuildDate>
    <item>
      <title>3381bd5e-f089-44ce-87a7-1ba6b9254755</title>
      <link>https://vulnerability.circl.lu/sighting/3381bd5e-f089-44ce-87a7-1ba6b9254755/export</link>
      <description>{"uuid": "3381bd5e-f089-44ce-87a7-1ba6b9254755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36916", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16989", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36916\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nblk-iocost: avoid out of bounds shift\n\nUBSAN catches undefined behavior in blk-iocost, where sometimes\niocg-&amp;gt;delay is shifted right by a number that is too large,\nresulting in undefined behavior on some architectures.\n\n[  186.556576] ------------[ cut here ]------------\nUBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23\nshift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')\nCPU: 16 PID: 0 Comm: swapper/16 Tainted: G S          E    N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1\nHardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020\nCall Trace:\n \n dump_stack_lvl+0x8f/0xe0\n __ubsan_handle_shift_out_of_bounds+0x22c/0x280\n iocg_kick_delay+0x30b/0x310\n ioc_timer_fn+0x2fb/0x1f80\n __run_timer_base+0x1b6/0x250\n...\n\nAvoid that undefined behavior by simply taking the\n\"delay = 0\" branch if the shift is too large.\n\nI am not sure what the symptoms of an undefined value\ndelay will be, but I suspect it could be more than a\nlittle annoying to debug.\n\ud83d\udccf Published: 2024-05-30T15:29:12.745Z\n\ud83d\udccf Modified: 2025-05-20T14:27:33.761Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5\n2. https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1\n3. https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca\n4. https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86\n5. https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b\n6. https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d", "creation_timestamp": "2025-05-20T14:40:54.000000Z"}</description>
      <content:encoded>{"uuid": "3381bd5e-f089-44ce-87a7-1ba6b9254755", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-36916", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16989", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-36916\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nblk-iocost: avoid out of bounds shift\n\nUBSAN catches undefined behavior in blk-iocost, where sometimes\niocg-&amp;gt;delay is shifted right by a number that is too large,\nresulting in undefined behavior on some architectures.\n\n[  186.556576] ------------[ cut here ]------------\nUBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23\nshift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')\nCPU: 16 PID: 0 Comm: swapper/16 Tainted: G S          E    N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1\nHardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020\nCall Trace:\n \n dump_stack_lvl+0x8f/0xe0\n __ubsan_handle_shift_out_of_bounds+0x22c/0x280\n iocg_kick_delay+0x30b/0x310\n ioc_timer_fn+0x2fb/0x1f80\n __run_timer_base+0x1b6/0x250\n...\n\nAvoid that undefined behavior by simply taking the\n\"delay = 0\" branch if the shift is too large.\n\nI am not sure what the symptoms of an undefined value\ndelay will be, but I suspect it could be more than a\nlittle annoying to debug.\n\ud83d\udccf Published: 2024-05-30T15:29:12.745Z\n\ud83d\udccf Modified: 2025-05-20T14:27:33.761Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5\n2. https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1\n3. https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca\n4. https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86\n5. https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b\n6. https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d", "creation_timestamp": "2025-05-20T14:40:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3381bd5e-f089-44ce-87a7-1ba6b9254755/export</guid>
      <pubDate>Tue, 20 May 2025 14:40:54 +0000</pubDate>
    </item>
  </channel>
</rss>
