In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: avoid out of bounds shift
UBSAN catches undefined behavior in blk-iocost, where sometimes
iocg->delay is shifted right by a number that is too large,
resulting in undefined behavior on some architectures.
[ 186.556576] ------------[ cut here ]------------
UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23
shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')
CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S E N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1
Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020
Call Trace:
<IRQ>
dump_stack_lvl+0x8f/0xe0
__ubsan_handle_shift_out_of_bounds+0x22c/0x280
iocg_kick_delay+0x30b/0x310
ioc_timer_fn+0x2fb/0x1f80
__run_timer_base+0x1b6/0x250
...
Avoid that undefined behavior by simply taking the
"delay = 0" branch if the shift is too large.
I am not sure what the symptoms of an undefined value
delay will be, but I suspect it could be more than a
little annoying to debug.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Jan 2026, 20:02
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b - Patch | |
| References | () https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5 - Patch | |
| References | () https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1 - Patch | |
| References | () https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d - Patch | |
| References | () https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86 - Patch | |
| References | () https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20240905-0006/ - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-125 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
21 Nov 2024, 09:22
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b - | |
| References | () https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5 - | |
| References | () https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1 - | |
| References | () https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d - | |
| References | () https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86 - | |
| References | () https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca - |
05 Nov 2024, 10:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Nov 2024, 21:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
27 Jun 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
30 May 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-30 16:15
Updated : 2026-01-22 20:02
NVD link : CVE-2024-36916
Mitre link : CVE-2024-36916
CVE.ORG link : CVE-2024-36916
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
